File name:

infected.elf

Full analysis: https://app.any.run/tasks/11a6a93c-55a9-4537-8be9-50cd6f953eb5
Verdict: Malicious activity
Threats:

A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.

Analysis date: April 21, 2025, 04:13:32
OS: Ubuntu 22.04.2
Tags:
auto
mirai
botnet
Indicators:
MIME: application/x-executable
File info: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
MD5:

D8689CC8FAC18781286F567D27CFEA0A

SHA1:

693B41E72E82BE77289584DBD00CF9A960B7A5F8

SHA256:

6B3A20FEF3FF1544248FC1EB75D80C40F271A4D36FF1ACA707999B328E50A29B

SSDEEP:

768:kMsJFhMxvp7oeVKF05LMls06e1qNeIG/FGdlXhjm6I:kMsGxhvTLJnTNS/UjhZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Modifies file or directory owner

      • sudo (PID: 39551)
    • Reads profile file

      • infected.elf (PID: 39556)
    • Checks DMI information (probably VM detection)

      • pipewire (PID: 39609)
      • pulseaudio (PID: 39611)
      • gnome-shell (PID: 39706)
    • Reads passwd file

      • pipewire (PID: 39609)
      • gdm-session-worker (PID: 39566)
      • pipewire-media-session (PID: 39610)
      • infected.elf (PID: 39556)
      • dbus-daemon (PID: 39620)
      • dbus-daemon (PID: 39647)
      • dbus-daemon (PID: 39737)
      • gvfs-udisks2-volume-monitor (PID: 39744)
      • ibus-daemon (PID: 39805)
      • gsd-print-notifications (PID: 39816)
      • gsd-media-keys (PID: 39840)
      • whoopsie (PID: 39783)
      • gsd-power (PID: 39854)
      • ibus-daemon (PID: 39953)
      • whoopsie (PID: 39994)
      • gdm-session-worker (PID: 40094)
      • gnome-shell (PID: 39706)
    • Reads /proc/mounts (likely used to find writable filesystems)

      • dbus-daemon (PID: 39620)
      • dbus-daemon (PID: 39647)
      • gnome-shell (PID: 39706)
      • dbus-daemon (PID: 39737)
      • gjs-console (PID: 39796)
      • gjs-console (PID: 39957)
      • snapd-desktop-integration (PID: 40001)
    • Executes commands using command-line interpreter

      • sudo (PID: 39554)
    • Connects to unusual port

      • infected.elf (PID: 39559)
    • Executes the "rm" command to delete files or directories

      • snapd-desktop-integration (PID: 40001)
    • Check the Environment Variables Related to System Identification (os-release)

      • snapd-desktop-integration (PID: 40001)
      • snapctl (PID: 40043)
      • snapctl (PID: 40051)
  • INFO

    • Checks timezone

      • gdm-session-worker (PID: 39566)
      • dbus-daemon (PID: 39620)
      • gnome-session-binary (PID: 39655)
      • python3.10 (PID: 39694)
      • gnome-shell (PID: 39706)
      • python3.10 (PID: 39807)
      • gsd-print-notifications (PID: 39816)
      • whoopsie (PID: 39783)
      • whoopsie (PID: 39994)
      • spice-vdagent (PID: 39951)
      • gsd-color (PID: 39814)
      • python3.10 (PID: 39687)
      • tracker-miner-fs-3 (PID: 39715)
    • Creates file in the temporary folder

      • gnome-shell (PID: 39706)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.o | ELF Executable and Linkable format (generic) (100)

EXIF

EXE

CPUArchitecture: 64 bit
CPUByteOrder: Little endian
ObjectFileType: Executable file
CPUType: AMD x86-64
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
414
Monitored processes
187
Malicious processes
0
Suspicious processes
4

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs chown no specs chmod no specs sudo no specs infected.elf no specs locale-check no specs infected.elf no specs infected.elf dash no specs gdm-session-worker no specs gnome-session-ctl no specs fusermount3 no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs dash no specs dash no specs gnome-session-ctl no specs systemd-user-runtime-dir no specs systemd no specs gdbus no specs systemd no specs systemd no specs 30-systemd-environment-d-generator no specs systemd no specs systemd-xdg-autostart-generator no specs systemctl no specs pipewire no specs pipewire-media-session no specs pulseaudio no specs snap-confine no specs tracker-extract-3 no specs gdm-wayland-session no specs dbus-daemon no specs gvfsd no specs snap-seccomp no specs dbus-run-session no specs gvfsd no specs gvfsd-fuse no specs dbus-daemon no specs fusermount3 no specs xdg-document-portal no specs gnome-session-binary no specs gst-plugin-scanner no specs xdg-permission-store no specs gst-plugin-scanner no specs session-migration no specs fusermount3 no specs dash no specs gsettings no specs gsettings no specs snap-confine no specs snap-confine no specs python3.10 no specs snap-update-ns no specs python3.10 no specs dash no specs gsettings no specs gsettings no specs gnome-shell no specs tracker-miner-fs-3 no specs dbus-daemon no specs at-spi-bus-launcher no specs dbus-daemon no specs xwayland no specs gvfs-udisks2-volume-monitor no specs gvfs-mtp-volume-monitor no specs gvfs-gphoto2-volume-monitor no specs gvfs-goa-volume-monitor no specs dbus-daemon no specs goa-daemon no specs dbus-daemon no specs goa-identity-service no specs gvfs-afc-volume-monitor no specs systemd-localed no specs whoopsie no specs dbus-daemon no specs dpkg no specs xdg-permission-store no specs geoclue no specs dbus-daemon no specs dbus-daemon no specs at-spi2-registryd no specs gjs-console no specs gsd-sharing no specs ibus-daemon no specs python3.10 no specs gsd-wacom no specs gsd-color no specs gsd-keyboard no specs gsd-print-notifications no specs gsd-rfkill no specs gsd-smartcard no specs gsd-datetime no specs gsd-media-keys no specs gsd-screensaver-proxy no specs gsd-sound no specs gsd-a11y-settings no specs gsd-housekeeping no specs gsd-power no specs ibus-engine-m17n no specs systemd-hostnamed no specs dbus-daemon no specs false no specs gsd-print-notifications no specs dash no specs gsd-printer no specs xkbcomp no specs fprintd no specs ibus-engine-mozc no specs ibus-engine-unikey no specs dbus-daemon no specs gvfsd no specs ibus-dconf no specs dbus-daemon no specs ibus-portal no specs spice-vdagent no specs xbrlapi no specs ibus-daemon no specs dbus-daemon no specs gjs-console no specs ibus-dconf no specs dash no specs ibus-daemon no specs dbus-daemon no specs ibus-x11 no specs xkbcomp no specs ibus-portal no specs ibus-engine-simple no specs dash no specs systemctl no specs whoopsie no specs dash no specs gnome-session-ctl no specs dbus-update-activation-environment no specs snapd-desktop-integration no specs snap-seccomp no specs snap-confine no specs snap-confine no specs snap-update-ns no specs date no specs chmod no specs bash no specs md5sum no specs cat no specs bash no specs cat no specs grep no specs md5sum no specs snapctl no specs snapctl no specs xdg-user-dirs-update no specs bash no specs realpath no specs bash no specs bash no specs bash no specs realpath no specs realpath no specs realpath no specs bash no specs bash no specs realpath no specs realpath no specs bash no specs realpath no specs bash no specs ln no specs realpath no specs rm no specs ln no specs snapd-desktop-integration no specs tracker-extract-3 no specs gvfsd-metadata no specs gdm-session-worker no specs

Process information

PID
CMD
Path
Indicators
Parent process
39550/bin/sh -c "sudo chown user /home/user/Downloads/infected\.elf && chmod +x /home/user/Downloads/infected\.elf && DISPLAY=:0 sudo -iu user /home/user/Downloads/infected\.elf "/usr/bin/dashany-guest-agent
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39551sudo chown user /home/user/Downloads/infected.elf/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39552chown user /home/user/Downloads/infected.elf/usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39553chmod +x /home/user/Downloads/infected.elf/usr/bin/chmoddash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39554sudo -iu user /home/user/Downloads/infected.elf/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39556/home/user/Downloads/infected.elf/home/user/Downloads/infected.elfsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
39557/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkinfected.elf
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
39558/home/user/Downloads/infected.elf/home/user/Downloads/infected.elfinfected.elf
User:
user
Integrity Level:
UNKNOWN
39559(sd-pam) r/Downloads/infected.elf/home/user/Downloads/infected.elf
infected.elf
User:
user
Integrity Level:
UNKNOWN
39565/bin/sh /etc/gdm3/PostSession/Default/usr/bin/dashgdm-session-worker
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
83
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
39673session-migration/var/lib/gdm3/.local/share/session_migration-(null)text
MD5:
SHA256:
39611pulseaudio/var/lib/gdm3/.cache/gstreamer-1.0/registry.x86_64.bin (deleted)binary
MD5:
SHA256:
39611pulseaudio/var/lib/gdm3/.config/pulse/cookiebinary
MD5:
SHA256:
39613tracker-extract-3/var/lib/gdm3/.cache/gstreamer-1.0/registry.x86_64.binbinary
MD5:
SHA256:
39715tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/meta.dbbinary
MD5:
SHA256:
39715tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/meta.db-journal (deleted)binary
MD5:
SHA256:
39706gnome-shell/tmp/.X1024-locktext
MD5:
SHA256:
39706gnome-shell/tmp/.X1025-locktext
MD5:
SHA256:
39715tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/ontologies.gvdbbinary
MD5:
SHA256:
39715tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/meta.db-shmbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
12
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
404
185.125.190.48:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
404
151.101.193.91:80
http://nmcheck.gnome.org/
unknown
whitelisted
GET
404
91.189.91.98:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
488
NetworkManager
GET
404
185.125.190.48:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
488
NetworkManager
GET
404
91.189.91.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
488
NetworkManager
GET
404
185.125.190.98:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
484
avahi-daemon
224.0.0.251:5353
unknown
185.125.190.49:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
91.189.91.48:80
connectivity-check.ubuntu.com
Canonical Group Limited
US
whitelisted
185.125.190.48:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
91.189.91.98:80
connectivity-check.ubuntu.com
Canonical Group Limited
US
whitelisted
151.101.193.91:80
nmcheck.gnome.org
FASTLY
US
whitelisted
39559
infected.elf
196.251.71.29:41277
fdh32fsdfhs.shop
SC
malicious
488
NetworkManager
185.125.190.48:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
488
NetworkManager
185.125.190.98:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
488
NetworkManager
91.189.91.96:80
connectivity-check.ubuntu.com
Canonical Group Limited
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.46
  • 2a00:1450:4001:827::200e
whitelisted
nmcheck.gnome.org
  • 151.101.193.91
  • 151.101.65.91
  • 151.101.1.91
  • 151.101.129.91
  • 2a04:4e42:200::347
  • 2a04:4e42:400::347
  • 2a04:4e42:600::347
  • 2a04:4e42::347
whitelisted
fdh32fsdfhs.shop
  • 196.251.71.29
malicious
connectivity-check.ubuntu.com
  • 185.125.190.48
  • 91.189.91.98
  • 185.125.190.96
  • 91.189.91.48
  • 185.125.190.98
  • 185.125.190.18
  • 91.189.91.97
  • 91.189.91.96
  • 91.189.91.49
  • 185.125.190.97
  • 185.125.190.49
  • 185.125.190.17
whitelisted
5.100.168.192.in-addr.arpa
unknown

Threats

No threats detected
No debug info