File name:

rep.x86_64

Full analysis: https://app.any.run/tasks/866800ef-8c5a-446a-ae45-609d5f859e33
Verdict: Malicious activity
Threats:

A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.

Analysis date: April 17, 2025, 00:13:49
OS: Ubuntu 22.04.2
Tags:
scan
ssh
sshscan
mirai
botnet
telnet
Indicators:
MIME: application/x-executable
File info: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
MD5:

C030BEB66EF57F5B710004277A7BD38B

SHA1:

16542612DF1C754285866C17DE29A07FF5AC89BD

SHA256:

88DE6169C2D460109E4E88802CE6AA1E53F4F39C8710EAE51593AE36C8485E6A

SSDEEP:

3072:VPXftQc668BHuLfgyutpLOQADZjPPXMFmSGlx:xXftQc668BHuLfgdtpyQADxPXMFWlx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Attempting to scan the network

      • (PID: 40663)
    • Attempting to connect via SSH

      • (PID: 40663)
    • MIRAI has been detected (SURICATA)

      • (PID: 40661)
    • SSHSCAN has been detected (SURICATA)

      • (PID: 40663)
  • SUSPICIOUS

    • Executes commands using command-line interpreter

      • sudo (PID: 40658)
    • Reads network configuration

      • (PID: 40661)
    • Gets active TCP connections

      • (PID: 40661)
    • Reads passwd file

      • rep.x86_64.elf (PID: 40659)
      • pipewire (PID: 40709)
      • pipewire (PID: 40690)
      • pipewire-media-session (PID: 40711)
      • dbus-daemon (PID: 40762)
      • gdm-session-worker (PID: 40707)
      • pipewire (PID: 40727)
      • pipewire-media-session (PID: 40729)
      • dbus-daemon (PID: 40744)
      • dbus-daemon (PID: 40861)
      • gvfs-udisks2-volume-monitor (PID: 40867)
      • ibus-daemon (PID: 40939)
      • pipewire-media-session (PID: 40810)
      • pipewire (PID: 40803)
      • gnome-shell (PID: 40829)
      • pipewire (PID: 40852)
      • ibus-daemon (PID: 41031)
      • gsd-media-keys (PID: 40971)
      • gsd-power (PID: 40989)
      • gsd-print-notifications (PID: 40946)
    • Checks DMI information (probably VM detection)

      • pipewire (PID: 40690)
      • pipewire (PID: 40709)
      • pulseaudio (PID: 40730)
      • pipewire (PID: 40803)
      • pipewire (PID: 40727)
      • pipewire (PID: 40725)
      • gnome-shell (PID: 40829)
      • pipewire (PID: 40852)
    • Modifies file or directory owner

      • sudo (PID: 40655)
    • Reads profile file

      • rep.x86_64.elf (PID: 40659)
    • Reads /proc/mounts (likely used to find writable filesystems)

      • dbus-daemon (PID: 40744)
      • dbus-daemon (PID: 40762)
      • dbus-daemon (PID: 40861)
      • gnome-shell (PID: 40829)
      • gjs-console (PID: 40925)
      • gjs-console (PID: 41067)
    • Contacting a server suspected of hosting an CnC

      • (PID: 40661)
    • Connects to unusual port

      • (PID: 40661)
    • Potential Corporate Privacy Violation

      • (PID: 40663)
  • INFO

    • Checks timezone

      • python3.10 (PID: 40807)
      • gdm-session-worker (PID: 40707)
      • dbus-daemon (PID: 40744)
      • gnome-session-binary (PID: 40766)
      • gnome-shell (PID: 40829)
      • tracker-miner-fs-3 (PID: 40837)
      • python3.10 (PID: 40817)
      • spice-vdagent (PID: 41046)
      • gsd-color (PID: 40941)
      • python3.10 (PID: 40967)
      • gsd-print-notifications (PID: 40946)
      • python3.10 (PID: 41036)
    • Creates file in the temporary folder

      • gnome-shell (PID: 40829)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.o | ELF Executable and Linkable format (generic) (100)

EXIF

EXE

CPUArchitecture: 64 bit
CPUByteOrder: Little endian
ObjectFileType: Executable file
CPUType: AMD x86-64
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
389
Monitored processes
169
Malicious processes
5
Suspicious processes
4

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs chown no specs chmod no specs sudo no specs rep.x86_64.elf no specs locale-check no specs #MIRAI         no specs #SSHSCAN         no specs gnome-session-ctl no specs dash no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs systemctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs pipewire no specs systemd no specs pulseaudio no specs gnome-session-ctl no specs dash no specs gnome-session-ctl no specs dbus-update-activation-environment no specs dash no specs fusermount3 no specs fusermount3 no specs gdm-session-worker no specs pipewire no specs fusermount3 no specs pipewire-media-session no specs pulseaudio no specs dash no specs dash no specs systemd-user-runtime-dir no specs systemd no specs systemd no specs systemd no specs 30-systemd-environment-d-generator no specs systemd no specs systemd-xdg-autostart-generator no specs systemctl no specs pipewire no specs pipewire-media-session no specs pipewire no specs pulseaudio no specs pipewire-media-session no specs pulseaudio no specs snap-confine no specs tracker-extract-3 no specs gdm-wayland-session no specs dbus-daemon no specs snap-seccomp no specs gvfsd no specs dbus-run-session no specs dbus-daemon no specs gnome-session-binary no specs gvfsd no specs gvfsd-fuse no specs fusermount3 no specs xdg-document-portal no specs xdg-permission-store no specs gst-plugin-scanner no specs gst-plugin-scanner no specs fusermount3 no specs session-migration no specs dash no specs gsettings no specs pipewire no specs gsettings no specs python3.10 no specs snap-confine no specs snap-confine no specs pipewire-media-session no specs snap-update-ns no specs pulseaudio no specs python3.10 no specs dash no specs gsettings no specs gsettings no specs gnome-shell no specs tracker-miner-fs-3 no specs pipewire no specs pipewire-media-session no specs pulseaudio no specs dbus-daemon no specs at-spi-bus-launcher no specs dbus-daemon no specs gvfs-udisks2-volume-monitor no specs xwayland no specs gvfs-mtp-volume-monitor no specs gvfs-gphoto2-volume-monitor no specs gvfs-goa-volume-monitor no specs dbus-daemon no specs goa-daemon no specs dbus-daemon no specs goa-identity-service no specs gvfs-afc-volume-monitor no specs systemd-localed no specs dbus-daemon no specs xdg-permission-store no specs geoclue no specs dbus-daemon no specs dbus-daemon no specs gjs-console no specs at-spi2-registryd no specs gsd-sharing no specs gsd-wacom no specs ibus-daemon no specs gsd-color no specs gsd-keyboard no specs gsd-print-notifications no specs gsd-rfkill no specs python3.10 no specs gsd-smartcard no specs gsd-datetime no specs gsd-media-keys no specs gsd-screensaver-proxy no specs gsd-sound no specs gsd-a11y-settings no specs gsd-housekeeping no specs gsd-power no specs systemd-hostnamed no specs dbus-daemon no specs false no specs dash no specs xkbcomp no specs ibus-engine-m17n no specs gsd-print-notifications no specs gsd-printer no specs ibus-daemon no specs dash no specs xkbcomp no specs python3.10 no specs snap no specs spice-vdagent no specs ibus-engine-mozc no specs xbrlapi no specs fprintd no specs ibus-engine-m17n no specs ibus-engine-unikey no specs dbus-daemon no specs dbus-daemon no specs gjs-console no specs gvfsd no specs ibus-dconf no specs dbus-daemon no specs ibus-portal no specs ibus-engine-mozc no specs ibus-engine-unikey no specs ibus-dconf no specs ibus-daemon no specs dbus-daemon no specs ibus-x11 no specs ibus-portal no specs ibus-engine-simple no specs tracker-extract-3 no specs gvfsd-metadata no specs

Process information

PID
CMD
Path
Indicators
Parent process
40654/bin/sh -c "sudo chown user /tmp/rep\.x86_64\.elf && chmod +x /tmp/rep\.x86_64\.elf && DISPLAY=:0 sudo -iu user /tmp/rep\.x86_64\.elf "/usr/bin/dashany-guest-agent
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40655sudo chown user /tmp/rep.x86_64.elf/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40656chown user /tmp/rep.x86_64.elf/usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40657chmod +x /tmp/rep.x86_64.elf/usr/bin/chmoddash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40658sudo -iu user /tmp/rep.x86_64.elf/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40659/tmp/rep.x86_64.elf/tmp/rep.x86_64.elfsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40660/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkrep.x86_64.elf
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40661 /tmp/
rep.x86_64.elf
User:
user
Integrity Level:
UNKNOWN
40662 /tmp/
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40663 /tmp/
User:
user
Integrity Level:
UNKNOWN
Executable files
0
Suspicious files
66
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
40796session-migration/var/lib/gdm3/.local/share/session_migration-(null)text
MD5:
SHA256:
40732tracker-extract-3/var/lib/gdm3/.cache/gstreamer-1.0/registry.x86_64.bin (deleted)binary
MD5:
SHA256:
40730pulseaudio/var/lib/gdm3/.cache/gstreamer-1.0/registry.x86_64.binbinary
MD5:
SHA256:
40730pulseaudio/var/lib/gdm3/.config/pulse/cookiebinary
MD5:
SHA256:
40837tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/meta.db-journal (deleted)binary
MD5:
SHA256:
40837tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/meta.dbbinary
MD5:
SHA256:
40837tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/ontologies.gvdbbinary
MD5:
SHA256:
40837tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/meta.db-shmbinary
MD5:
SHA256:
40829gnome-shell/tmp/.X1024-locktext
MD5:
SHA256:
40829gnome-shell/tmp/.X1025-locktext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
23 336
DNS requests
10
Threats
51

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
91.189.91.97:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
91.189.91.97:80
connectivity-check.ubuntu.com
Canonical Group Limited
US
whitelisted
484
avahi-daemon
224.0.0.251:5353
unknown
40663
143.204.134.197:23
AMAZON-02
US
unknown
40663
185.57.205.102:23
Multicanal Del Cable Tvm Sl
ES
unknown
40663
52.128.72.145:23
US
unknown
40663
160.218.0.197:23
O2 Czech Republic, a.s.
CZ
unknown
40663
44.89.8.123:23
UCSD
US
unknown
40663
104.70.76.60:23
AKAMAI-AS
US
unknown
40663
41.47.43.146:23
TE-AS
EG
unknown
40663
126.216.181.244:23
Softbank BB Corp.
JP
unknown

DNS requests

Domain
IP
Reputation
connectivity-check.ubuntu.com
  • 91.189.91.97
  • 91.189.91.48
  • 91.189.91.98
  • 185.125.190.96
  • 185.125.190.98
  • 185.125.190.49
  • 185.125.190.48
  • 185.125.190.18
  • 185.125.190.17
  • 91.189.91.49
  • 185.125.190.97
  • 91.189.91.96
  • 2620:2d:4002:1::198
  • 2620:2d:4000:1::98
  • 2620:2d:4002:1::196
  • 2620:2d:4000:1::97
  • 2001:67c:1562::23
  • 2620:2d:4000:1::2b
  • 2620:2d:4000:1::22
  • 2620:2d:4000:1::2a
  • 2620:2d:4000:1::96
  • 2620:2d:4000:1::23
  • 2001:67c:1562::24
  • 2620:2d:4002:1::197
whitelisted
google.com
  • 142.250.185.238
  • 2a00:1450:4001:827::200e
whitelisted
thekittler.ru
  • 213.209.143.24
unknown
12.100.168.192.in-addr.arpa
unknown
kittlerer.ru
  • 213.209.143.24
unknown
cuttiecats.ru
  • 213.209.143.24
unknown

Threats

PID
Process
Class
Message
40661
A Network Trojan was detected
MALWARE [ANY.RUN] Suspected Domain Associated with Malware Distribution (kittler .ru)
40661
A Network Trojan was detected
MALWARE [ANY.RUN] Suspected Domain Associated with Malware Distribution (thekittler .ru)
40663
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to SSH scan external network
40661
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Possible Mirai.Gen (Linux)
40661
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Possible Mirai.Gen (Linux)
40661
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Possible Mirai.Gen (Linux)
40661
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Possible Mirai.Gen (Linux)
40663
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to SSH scan external network
40661
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Possible Mirai.Gen (Linux)
40661
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Possible Mirai.Gen (Linux)
No debug info