File name:

geomi

Full analysis: https://app.any.run/tasks/3b5b9ff4-d42d-441a-a6c2-c35ae31bb83f
Verdict: Malicious activity
Analysis date: June 19, 2024, 12:50:42
OS: Ubuntu 22.04.2
MIME: application/x-executable
File info: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
MD5:

60F23ACEBF0DDB51A3176D0750055CF8

SHA1:

D729AA662EA7D652908326DC5D91B97D836BA936

SHA256:

7E62E3E8911C0CB19DF3477DF0603FDDEFF82223E1CC6DA7FB1698F512FF2CD2

SSDEEP:

98304:AcV3/H5H11274A+zeinKIkTdRunOOaHN5TlUeudjnBUYNit/WzNWp+vAn/Gw2+hf:N9gg0bx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Writes to Systemd service files (likely for persistence achievement)

      • systemd (PID: 12953)
    • Modifies file or directory owner

      • sudo (PID: 12915)
    • Executes commands using command-line interpreter

      • bash (PID: 12923)
    • Creates or rewrites file in the "bin" folder

      • geomi.o (PID: 12921)
    • Connects to unusual port

      • geomi (PID: 13003)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.o | ELF Executable and Linkable format (generic) (49.8)

EXIF

EXE

CPUArchitecture: 64 bit
CPUByteOrder: Little endian
ObjectFileType: Executable file
CPUType: AMD x86-64
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
264
Monitored processes
50
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start sh no specs sudo no specs systemctl no specs chown no specs chmod no specs sudo no specs systemctl no specs geomi.o locale-check no specs bash no specs sh no specs tr no specs cat no specs mesg no specs geomi geomi no specs systemctl no specs systemd no specs snapd-env-generator no specs systemd no specs friendly-recovery no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs snapd-env-generator no specs systemd no specs friendly-recovery no specs netplan no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs dash no specs systemctl no specs rm no specs geomi systemctl no specs

Process information

PID
CMD
Path
Indicators
Parent process
12914/bin/sh -c "sudo chown user /tmp/geomi\.o && chmod +x /tmp/geomi\.o && DISPLAY=:0 sudo -i /tmp/geomi\.o "/bin/shany-guest-agent
User:
user
Integrity Level:
UNKNOWN
Exit code:
482
12915sudo chown user /tmp/geomi.o/usr/bin/sudosh
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
12916systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
12917chown user /tmp/geomi.o/usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
12918chmod +x /tmp/geomi.o/usr/bin/chmodsh
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
12919sudo -i /tmp/geomi.o/usr/bin/sudosh
User:
user
Integrity Level:
UNKNOWN
Exit code:
482
12920systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
12921/tmp/geomi.o/tmp/geomi.o
sudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
482
12922/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkgeomi.o
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
12923-bash --login -c \/tmp\/geomi\.o/usr/bin/bashgeomi.o
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
12921geomi.o/usr/bin/geomibinary
MD5:
SHA256:
12937geomi/etc/systemd/system/geomi.servicetext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
18
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
185.125.190.96:80
http://connectivity-check.ubuntu.com/
unknown
unknown
13003
geomi
GET
200
52.214.118.9:80
http://checkip.amazonaws.com/
unknown
unknown
13003
geomi
GET
302
34.117.186.192:80
http://ipinfo.io/country
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
470
avahi-daemon
224.0.0.251:5353
unknown
185.125.190.96:80
Canonical Group Limited
GB
unknown
195.181.175.16:443
odrs.gnome.org
Datacamp Limited
DE
unknown
185.125.188.58:443
api.snapcraft.io
Canonical Group Limited
GB
unknown
12921
geomi.o
104.16.248.249:443
cloudflare-dns.com
CLOUDFLARENET
shared
12921
geomi.o
116.203.98.109:443
api.opennic.org
Hetzner Online GmbH
DE
unknown
485
snapd
185.125.188.55:443
api.snapcraft.io
Canonical Group Limited
GB
malicious
485
snapd
185.125.188.58:443
api.snapcraft.io
Canonical Group Limited
GB
unknown
12937
geomi
104.16.248.249:443
cloudflare-dns.com
CLOUDFLARENET
shared
12937
geomi
116.203.98.109:443
api.opennic.org
Hetzner Online GmbH
DE
unknown

DNS requests

Domain
IP
Reputation
odrs.gnome.org
  • 195.181.175.16
  • 212.102.56.179
  • 212.102.56.182
  • 156.146.33.138
  • 156.146.33.15
  • 195.181.175.41
  • 156.146.33.140
  • 2a02:6ea0:c700::101
  • 2a02:6ea0:c700::17
  • 2a02:6ea0:c700::21
  • 2a02:6ea0:c700::10
  • 2a02:6ea0:c700::22
  • 2a02:6ea0:c700::18
  • 2a02:6ea0:c700::11
unknown
api.snapcraft.io
  • 185.125.188.58
  • 185.125.188.54
  • 185.125.188.55
  • 185.125.188.59
unknown
cloudflare-dns.com
  • 2606:4700::6810:f9f9
  • 2606:4700::6810:f8f9
  • 104.16.248.249
  • 104.16.249.249
whitelisted
api.opennic.org
  • 2a01:4f8:1c1c:bd6f::1
  • 116.203.98.109
unknown
checkip.amazonaws.com
  • 52.214.118.9
  • 54.194.215.63
  • 108.128.83.87
  • 34.251.61.44
  • 52.210.188.244
  • 52.48.204.56
shared
ipinfo.io
  • 34.117.186.192
shared
50.100.168.192.in-addr.arpa
unknown
connectivity-check.ubuntu.com
  • 2620:2d:4000:1::2a
  • 2001:67c:1562::24
  • 2620:2d:4000:1::98
  • 2001:67c:1562::23
  • 2620:2d:4000:1::23
  • 2620:2d:4002:1::196
  • 2620:2d:4002:1::197
  • 2620:2d:4000:1::22
  • 2620:2d:4000:1::97
  • 2620:2d:4000:1::96
  • 2620:2d:4000:1::2b
  • 2620:2d:4002:1::198
unknown

Threats

No threats detected
No debug info