File name:

x

Full analysis: https://app.any.run/tasks/0054eb7a-f158-4073-9459-f1becb67742a
Verdict: Malicious activity
Threats:

Crypto mining malware is a resource-intensive threat that infiltrates computers with the purpose of mining cryptocurrencies. This type of threat can be deployed either on an infected machine or a compromised website. In both cases the miner will utilize the computing power of the device and its network bandwidth.

Analysis date: January 26, 2024, 11:23:43
OS: Ubuntu 22.04.2
Tags:
miner
Indicators:
MIME: application/x-executable
File info: ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), statically linked, no section header
MD5:

C82BB3C68F7A033B407AA3F53827B7FD

SHA1:

6296E8ED40E430480791BF7B4FCDAFDE5F834837

SHA256:

6FC94D8AECC538B1D099A429FB68AC20D7B6AE8B3C7795AE72DD2B7107690B8F

SSDEEP:

98304:zN/hECQ7xzdIgZCblfs1oWnjZXoJdSDySFqj12PgvvLJgDsj7yH0i22rkidzx7TR:kzA+l

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads passwd file

      • bash (PID: 6976)
      • bash (PID: 7034)
      • bash (PID: 6952)
      • bash (PID: 6997)
      • nautilus (PID: 6875)
      • bash (PID: 7011)
      • bash (PID: 6937)
      • chown (PID: 6851)
      • x.o (PID: 6854)
    • Executes commands using command-line interpreter

      • gnome-terminal-server (PID: 6919)
      • bash (PID: 6856)
    • Modifies file or directory owner

      • sudo (PID: 6850)
    • Checks DMI information (probably VM detection)

      • x.o (PID: 6854)
    • Checks the online status of NUMA nodes

      • x.o (PID: 6854)
    • Checks list of the CPUs

      • x.o (PID: 6854)
    • Checks active cgroups controllers (like CPU time, system memory, network bandwidth)

      • x.o (PID: 6854)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.o | ELF Executable and Linkable format (generic) (100)

EXIF

EXE

CPUArchitecture: 64 bit
CPUByteOrder: Little endian
ObjectFileType: Executable file
CPUType: AMD x86-64
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
287
Monitored processes
69
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start sh no specs sudo no specs chown no specs chmod no specs sudo no specs x.o no specs locale-check no specs bash no specs sh no specs tr no specs cat no specs mesg no specs x.o no specs nautilus no specs gsd-media-keys no specs gnome-terminal no specs gnome-terminal.real no specs gnome-terminal-server no specs bash no specs lesspipe no specs basename no specs dash no specs dirname no specs dircolors no specs gnome-shell no specs gnome-terminal no specs gnome-terminal.real no specs bash no specs lesspipe no specs basename no specs dash no specs dirname no specs dircolors no specs gnome-shell no specs gnome-terminal no specs gnome-terminal.real no specs bash no specs lesspipe no specs basename no specs dash no specs dirname no specs dircolors no specs gsd-media-keys no specs gnome-terminal no specs gnome-terminal.real no specs bash no specs lesspipe no specs basename no specs dash no specs dircolors no specs dirname no specs gsd-media-keys no specs gnome-terminal no specs gnome-terminal.real no specs bash no specs lesspipe no specs basename no specs dash no specs dirname no specs dircolors no specs gsd-media-keys no specs gnome-terminal no specs gnome-terminal.real no specs bash no specs lesspipe no specs basename no specs dash no specs dirname no specs dircolors no specs

Process information

PID
CMD
Path
Indicators
Parent process
6849/bin/sh -c "sudo chown user \"/tmp/x\.o\" && chmod +x \"/tmp/x\.o\" && DISPLAY=:0 sudo -i \"/tmp/x\.o\" " /bin/shany-guest-agent
User:
user
Integrity Level:
UNKNOWN
Exit code:
6762
6850sudo chown user /tmp/x.o /usr/bin/sudosh
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6851chown user /tmp/x.o /usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
6852chmod +x /tmp/x.o /usr/bin/chmodsh
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6853sudo -i /tmp/x.o /usr/bin/sudosh
User:
user
Integrity Level:
UNKNOWN
Exit code:
6762
6854/tmp/x.o /tmp/x.osudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
6762
6855/usr/bin/locale-check C.UTF-8 /usr/bin/locale-checkx.o
User:
root
Integrity Level:
UNKNOWN
Exit code:
1214
6856-bash --login -c \/tmp\/x\.o /usr/bin/bashx.o
User:
root
Integrity Level:
UNKNOWN
Exit code:
6762
6857sh -c "cat /usr/etc/debuginfod/*\.urls 2>/dev/null" /usr/bin/shbash
User:
root
Integrity Level:
UNKNOWN
Exit code:
6762
6858tr \n " " /usr/bin/trbash
User:
root
Integrity Level:
UNKNOWN
Exit code:
6762
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6875nautilus/home/user/.local/share/nautilus/tags/meta.db-wal
MD5:
SHA256:
6875nautilus/home/user/.local/share/nautilus/tags/meta.db-shm
MD5:
SHA256:
6875nautilus/home/user/.local/share/nautilus/tags/.meta.isrunning
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
77
DNS requests
7
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.251:5353
unknown
185.125.188.59:443
api.snapcraft.io
Canonical Group Limited
GB
unknown
193.124.33.22:80
RU
unknown
185.87.48.183:80
Network Management Ltd
RU
unknown
193.124.33.22:443
RU
unknown
176.113.81.186:80
JSC RetnNet
RU
unknown
194.87.254.160:443
AS-SERVERION
CZ
unknown
92.255.110.4:80
TimeWeb Ltd.
RU
unknown
92.255.110.4:443
TimeWeb Ltd.
RU
unknown
194.87.254.160:80
AS-SERVERION
CZ
unknown

DNS requests

Domain
IP
Reputation
api.snapcraft.io
  • 185.125.188.59
  • 185.125.188.58
  • 185.125.188.55
  • 185.125.188.54
unknown
190.100.168.192.in-addr.arpa
unknown
connectivity-check.ubuntu.com
  • 2620:2d:4000:1::2b
  • 2620:2d:4000:1::23
  • 2001:67c:1562::24
  • 2001:67c:1562::23
  • 2620:2d:4000:1::22
  • 2620:2d:4000:1::2a
unknown

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY Cryptocurrency Miner Checkin
No debug info