URL:

https://ryujinx.org/

Full analysis: https://app.any.run/tasks/4bc9e6f3-b95d-4dca-8c68-69934fad9700
Verdict: Malicious activity
Analysis date: January 28, 2024, 09:10:30
OS: Ubuntu 22.04.2
MD5:

BF7E70D824604F7C2E6A2C8E2693B9FD

SHA1:

F8D15CB89533D78EDB983DCCCC8442203D132876

SHA256:

897330917F61C38DE327C20BA74AFC8420EB616D0538248CE739986DCA033C59

SSDEEP:

3:N8nJ:2J

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Creates shell script file

      • file-roller (PID: 7421)
    • Reads /proc/mounts (likely used to find writable filesystems)

      • firefox (PID: 6852)
    • Uses pkexec (likely to bypass security restrictions)

      • Ryujinx (PID: 7534)
    • Gets information about CPU, Memory or Filesystem

      • Ryujinx (PID: 7534)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
454
Monitored processes
86
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start sh no specs sudo no specs firefox no specs locale-check no specs snap-seccomp no specs snap-confine no specs snap-confine no specs 5 no specs date no specs chmod no specs bash no specs md5sum no specs cat no specs bash no specs md5sum no specs cat no specs grep no specs snapctl no specs snapctl no specs realpath no specs realpath no specs xdg-user-dirs-update no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs bash no specs realpath no specs ln no specs rm no specs ln no specs firefox no specs glxtest no specs snap no specs firefox no specs firefox no specs firefox no specs firefox no specs xdg-settings no specs dbus-send no specs cut no specs xdg-settings no specs awk no specs awk no specs firefox no specs firefox no specs xdg-settings no specs dbus-send no specs cut no specs xdg-settings no specs awk no specs awk no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs xdg-settings no specs dbus-send no specs cut no specs xdg-settings no specs awk no specs awk no specs firefox no specs firefox no specs snapctl no specs file-roller no specs nautilus no specs nautilus no specs nautilus no specs ryujinx no specs pkexec no specs polkit-agent-helper-1 no specs ibus-engine-simple no specs

Process information

PID
CMD
Path
Indicators
Parent process
6850/bin/sh -c "DISPLAY=:0 sudo -iu user firefox \"https://ryujinx\.org/\" " /bin/shany-guest-agent
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
6851sudo -iu user firefox https://ryujinx.org/ /usr/bin/sudosh
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
6852/snap/firefox/3358/usr/lib/firefox/firefox https://ryujinx.org/ /snap/firefox/3358/usr/lib/firefox/firefoxsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6853/usr/bin/locale-check C.UTF-8 /usr/bin/locale-checkfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6866/snap/snapd/20290/usr/lib/snapd/snap-seccomp version-info /snap/snapd/20290/usr/lib/snapd/snap-seccompfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6874/snap/snapd/20290/usr/lib/snapd/snap-confine --base core22 snap.firefox.firefox /usr/lib/snapd/snap-exec firefox https://ryujinx.org/ /snap/snapd/20290/usr/lib/snapd/snap-confinefirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6875/snap/snapd/20290/usr/lib/snapd/snap-confine --base core22 snap.firefox.firefox /usr/lib/snapd/snap-exec firefox https://ryujinx.org/ /snap/snapd/20290/usr/lib/snapd/snap-confinefirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6876snap-update-ns --from-snap-confine --user-mounts firefox /dev/fd/5firefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6887date +%s.%N /usr/bin/datefirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
6888chmod 700 /home/user/snap/firefox/3358/.config /usr/bin/chmodfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6852firefox/tmp/snap-private-tmp/snap.firefox/tmp/firefox/.parentlock
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.cache/mozilla/firefox/roxl94gw.default/.startup-incomplete
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/sessionCheckpoints.json.tmp
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/storage.sqlite-journal
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.cache/mozilla/firefox/roxl94gw.default/cache2/entries/697B4BD062301CA94610EC1AB8F5AE2B52F47D03
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/content-prefs.sqlite-journal
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/protections.sqlite-journal
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.cache/mozilla/firefox/roxl94gw.default/cache2/entries/495D31B861F4BD9E75AF45DFB2894D9259AAEB8C
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.cache/mozilla/firefox/roxl94gw.default/cache2/entries/864711C73B2B436C5E208C010EF404BDA65B0E1F
MD5:
SHA256:
6852firefox/home/user/snap/firefox/common/.mozilla/firefox/roxl94gw.default/prefs-1.js
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
60
DNS requests
106
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
200
2.16.202.115:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
POST
200
2.16.202.115:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
text
8 b
unknown
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
text
90 b
unknown
POST
200
142.250.185.163:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
POST
200
142.250.185.163:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
POST
200
142.250.185.163:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
POST
200
142.250.185.163:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
POST
200
18.239.104.165:80
http://ocsp.r2m02.amazontrust.com/
unknown
binary
471 b
unknown
POST
200
142.250.185.163:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
195.181.170.18:443
Datacamp Limited
DE
unknown
224.0.0.251:5353
unknown
128.140.11.116:443
ryujinx.org
Hetzner Online GmbH
IR
unknown
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
unknown
34.117.237.239:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
unknown
3.86.119.92:443
spocs.getpocket.com
AMAZON-AES
US
unknown
2.16.202.115:80
r3.o.lencr.org
Akamai International B.V.
NL
unknown
142.250.186.74:443
fonts.googleapis.com
unknown
34.160.144.191:443
content-signature-2.cdn.mozilla.net
GOOGLE
US
unknown
142.250.185.163:80
ocsp.pki.goog
GOOGLE
US
unknown

DNS requests

Domain
IP
Reputation
ryujinx.org
  • 128.140.11.116
  • 2a01:4f8:1c1b:8b11::1
unknown
detectportal.firefox.com
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 93.184.216.34
  • 2606:2800:220:1:248:1893:25c8:1946
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
contile.services.mozilla.com
  • 34.117.237.239
whitelisted
spocs.getpocket.com
  • 3.86.119.92
  • 3.216.15.175
  • 18.210.60.24
  • 52.45.210.128
shared
r3.o.lencr.org
  • 2.16.202.115
  • 95.101.54.137
  • 95.101.54.138
  • 95.101.54.121
  • 95.101.54.216
  • 2.16.202.120
  • 95.101.54.112
  • 95.101.54.139
  • 2a02:26f0:480:e::210:f10f
  • 2a02:26f0:480:e::210:f108
  • 95.101.54.130
  • 95.101.54.217
shared
proxyserverecs-1736642167.us-east-1.elb.amazonaws.com
unknown
content-signature-2.cdn.mozilla.net
  • 34.160.144.191
  • 2600:1901:0:92a9::
whitelisted
fonts.googleapis.com
  • 142.250.186.74
  • 2a00:1450:4001:806::200a
whitelisted

Threats

No threats detected
No debug info