URL:

belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion

Full analysis: https://app.any.run/tasks/5427006e-3537-4142-99f3-2b25a594a51b
Verdict: Malicious activity
Analysis date: January 16, 2025, 09:35:09
OS: Ubuntu 22.04.2 LTS
Indicators:
MD5:

7CAB492912DF2DFEFFAF9C6FD07C7414

SHA1:

266C8B73720269A5B3D40520131073D26729C742

SHA256:

8706C4029BEC49E5CE81A41956A85C14B4A3855A791EE74B78699E7FB796C6A6

SSDEEP:

3:pE9IMAMb+TBI3FX+tELQ:plMb+aotE0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Potential Corporate Privacy Violation

      • systemd-resolved (PID: 445)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
318
Monitored processes
111
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs chrome no specs locale-check no specs readlink no specs dirname no specs mkdir no specs cat no specs cat no specs chrome no specs chrome no specs chrome_crashpad_handler no specs chrome no specs chrome no specs chrome_crashpad_handler no specs chrome_crashpad_handler no specs chrome no specs chrome no specs chrome no specs chrome chrome no specs chrome no specs chrome no specs dash no specs dbus-send no specs dash no specs dash no specs dash no specs basename no specs dash no specs dash no specs readlink no specs dash no specs dash no specs grep no specs cut no specs dash no specs dbus-send no specs dash no specs dash no specs dash no specs dash no specs chrome no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs dbus-send no specs dash no specs dash no specs dash no specs grep no specs cut no specs dash no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs grep no specs cut no specs dash no specs chrome no specs chrome no specs systemd-resolved chrome no specs readlink no specs dirname no specs mkdir no specs cat no specs cat no specs systemctl no specs systemctl no specs chrome no specs systemctl no specs systemctl no specs chrome no specs systemctl no specs systemctl no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs

Process information

PID
CMD
Path
Indicators
Parent process
445/lib/systemd/systemd-resolved/usr/lib/systemd/systemd-resolved
systemd
User:
systemd-resolve
Integrity Level:
UNKNOWN
38754/bin/sh -c "DISPLAY=:0 sudo -iu user google-chrome belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad\.onion "/usr/bin/dashany-guest-agent
User:
root
Integrity Level:
UNKNOWN
38755sudo -iu user google-chrome belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
38756/usr/bin/google-chrome belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/opt/google/chrome/chromesudo
User:
user
Integrity Level:
UNKNOWN
38757/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkchrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38758readlink -f /usr/bin/google-chrome/usr/bin/readlinkchrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38759dirname /opt/google/chrome/google-chrome/usr/bin/dirnamechrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38760mkdir -p /home/user/.local/share/applications/usr/bin/mkdirchrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38761cat/usr/bin/catchrome
User:
user
Integrity Level:
UNKNOWN
38762cat/usr/bin/catchrome
User:
user
Integrity Level:
UNKNOWN
Executable files
0
Suspicious files
172
Text files
14
Unknown types
10

Dropped files

PID
Process
Filename
Type
38756chrome/home/user/.config/google-chrome/ShaderCache/data_3binary
MD5:
SHA256:
38756chrome/home/user/.config/google-chrome/ShaderCache/data_2vxd
MD5:
SHA256:
38756chrome/home/user/.config/google-chrome/ShaderCache/data_0binary
MD5:
SHA256:
38756chrome/home/user/.config/google-chrome/Default/GPUCache/data_3vxd
MD5:
SHA256:
38756chrome/home/user/.config/google-chrome/Default/GPUCache/data_2vxd
MD5:
SHA256:
38756chrome/home/user/.config/google-chrome/Default/GPUCache/data_0vxd
MD5:
SHA256:
38756chrome/home/user/.config/google-chrome/Default/Historybinary
MD5:
SHA256:
38756chrome/home/user/.config/google-chrome/Default/DawnWebGPUCache/data_3vxd
MD5:
SHA256:
38756chrome/home/user/.config/google-chrome/Default/DawnWebGPUCache/data_2vxd
MD5:
SHA256:
38756chrome/home/user/.config/google-chrome/Default/DawnWebGPUCache/data_0vxd
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
28
TCP/UDP connections
71
DNS requests
69
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
185.125.190.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
38801
chrome
GET
10.235.157.191:80
http://belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/
unknown
unknown
38801
chrome
GET
10.235.157.191:80
http://belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/
unknown
unknown
38801
chrome
GET
10.235.157.191:80
http://belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/
unknown
unknown
38801
chrome
GET
10.235.157.191:80
http://belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/
unknown
unknown
38801
chrome
GET
10.235.157.191:80
http://belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/
unknown
unknown
38801
chrome
GET
10.235.157.191:80
http://belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/files/FortiGate.zip
unknown
unknown
38801
chrome
GET
10.235.157.191:80
http://belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/files/FortiGate.zip
unknown
unknown
38801
chrome
GET
10.235.157.191:80
http://belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/files/FortiGate.zip
unknown
unknown
38801
chrome
GET
10.235.157.191:80
http://belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion/files/FortiGate.zip
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
91.189.91.98:80
connectivity-check.ubuntu.com
Canonical Group Limited
US
whitelisted
185.125.190.96:80
Canonical Group Limited
GB
unknown
484
avahi-daemon
224.0.0.251:5353
unknown
1178
snap-store
212.102.56.179:443
odrs.gnome.org
Datacamp Limited
DE
whitelisted
38801
chrome
10.235.157.191:80
belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion
unknown
38801
chrome
10.235.157.191:443
belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion
unknown
38801
chrome
142.250.185.227:443
clientservices.googleapis.com
GOOGLE
US
whitelisted
38801
chrome
142.250.184.202:443
safebrowsingohttpgateway.googleapis.com
GOOGLE
US
whitelisted
38801
chrome
108.177.127.84:443
accounts.google.com
GOOGLE
US
whitelisted
38801
chrome
146.75.121.91:443
google-ohttp-relay-safebrowsing.fastly-edge.com
FASTLY
US
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.206
  • 2a00:1450:4001:810::200e
whitelisted
odrs.gnome.org
  • 212.102.56.179
  • 2a02:6ea0:c700::21
whitelisted
clientservices.googleapis.com
  • 142.250.185.227
whitelisted
safebrowsingohttpgateway.googleapis.com
  • 142.250.184.202
whitelisted
belsenacdodoy3nsmmyjfmtgjen6ipaqkti7dm2q57vabjx2vzq6tnad.onion
  • 10.235.157.191
unknown
accounts.google.com
  • 108.177.127.84
whitelisted
google-ohttp-relay-safebrowsing.fastly-edge.com
  • 146.75.121.91
unknown
api.snapcraft.io
  • 185.125.188.55
  • 2620:2d:4000:1010::42
  • 185.125.188.58
  • 2620:2d:4000:1010::6d
whitelisted
update.googleapis.com
  • 142.250.181.227
whitelisted
179.100.168.192.in-addr.arpa
unknown

Threats

PID
Process
Class
Message
445
systemd-resolved
Potential Corporate Privacy Violation
ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR
445
systemd-resolved
Potential Corporate Privacy Violation
ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR
445
systemd-resolved
Potential Corporate Privacy Violation
ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR
445
systemd-resolved
Potential Corporate Privacy Violation
ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR
445
systemd-resolved
Potential Corporate Privacy Violation
ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR
445
systemd-resolved
Potential Corporate Privacy Violation
ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR
445
systemd-resolved
Potential Corporate Privacy Violation
ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR
445
systemd-resolved
Potential Corporate Privacy Violation
ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR
445
systemd-resolved
Potential Corporate Privacy Violation
ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR
445
systemd-resolved
Potential Corporate Privacy Violation
ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR
No debug info