download:

/Information/f6UKALOfa0GZmo

Full analysis: https://app.any.run/tasks/abc3efee-b1a6-49ff-929f-82bfaee61076
Verdict: Malicious activity
Analysis date: April 10, 2025, 13:07:10
OS: Ubuntu 22.04.2
MIME: text/html
File info: HTML document, ASCII text, with very long lines (302)
MD5:

6B728DEFD4AC27F89D785A5AB8BF8853

SHA1:

16748A5A9414EAFA7C272DE07B7F924044426408

SHA256:

93FD8FD8AA0031E24F376285601C09DFFE7A0E177B80FBAFC4EDBAB2579AC4B8

SSDEEP:

96:05pkSO7mi0iOaGqT5PqUJVtsKdddatUdddRdddskxdddOTucxCx:0dami0iOafyQMOyPCx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Check the Environment Variables Related to System Identification (os-release)

      • firefox (PID: 40663)
      • snapctl (PID: 40714)
      • snapctl (PID: 40758)
      • snapctl (PID: 40720)
      • snapctl (PID: 40753)
    • Executes commands using command-line interpreter

      • sudo (PID: 40662)
      • firefox (PID: 40663)
    • Reads passwd file

      • dumpe2fs (PID: 40687)
      • dumpe2fs (PID: 40694)
  • INFO

    • Creates file in the temporary folder

      • firefox (PID: 40663)
    • Checks timezone

      • dumpe2fs (PID: 40687)
      • dumpe2fs (PID: 40694)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.html | HyperText Markup Language (100)

EXIF

HTML

HTTPEquivXUACompatible: IE=edge
Viewport: width=device-width, initial-scale=1, maximum-scale=1, user-scalable=no
CacheControl: no-store, no-cache, must-revalidate
Pragma: no-cache
Expires: -
Robots: noindex, nofollow
GoogleBot: noindex, nofollow
Title: File Link Information - BiteBlob
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
393
Monitored processes
173
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs firefox locale-check no specs snap-seccomp no specs snap-confine no specs dumpe2fs no specs snap-update-ns no specs dumpe2fs no specs snap-update-ns no specs date no specs chmod no specs bash no specs cat no specs bash no specs cat no specs md5sum no specs md5sum no specs grep no specs snapctl no specs snapctl no specs mkdir no specs realpath no specs realpath no specs xdg-user-dirs-update no specs bash no specs bash no specs bash no specs realpath no specs realpath no specs realpath no specs bash no specs bash no specs realpath no specs realpath no specs bash no specs bash no specs realpath no specs realpath no specs bash no specs realpath no specs ln no specs mkdir no specs ln no specs rm no specs ln no specs firefox no specs systemctl no specs snapctl no specs snapctl no specs glxtest no specs systemctl no specs systemctl no specs systemctl no specs snap no specs systemctl no specs firefox no specs firefox no specs systemd-timedated no specs firefox no specs firefox no specs bash no specs dbus-send no specs cut no specs dbus-daemon no specs snap no specs dash no specs dash no specs dash no specs dash no specs basename no specs dash no specs dash no specs readlink no specs dash no specs grep no specs cut no specs dash no specs dash no specs dash no specs dash no specs tr no specs dash no specs dash no specs dash no specs dash no specs tr no specs mawk no specs cut no specs basename no specs dash no specs grep no specs cut no specs dash no specs dash no specs readlink no specs firefox no specs firefox no specs bash no specs dbus-send no specs cut no specs dash no specs dash no specs dash no specs dash no specs basename no specs dash no specs dash no specs readlink no specs dash no specs grep no specs cut no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs tr no specs dash no specs tr no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs grep no specs cut no specs dash no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs firefox no specs bash no specs dbus-send no specs cut no specs dash no specs dash no specs dash no specs basename no specs dash no specs dash no specs readlink no specs dash no specs grep no specs cut no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs dash no specs tr no specs dash no specs tr no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs grep no specs cut no specs dash no specs

Process information

PID
CMD
Path
Indicators
Parent process
40661/bin/sh -c "DISPLAY=:0 sudo -iu user firefox /tmp/f6UKALOfa0GZmo\.html "/usr/bin/dashany-guest-agent
User:
user
Integrity Level:
UNKNOWN
40662sudo -iu user firefox /tmp/f6UKALOfa0GZmo.html/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
40663/snap/firefox/3358/usr/lib/firefox/firefox /tmp/f6UKALOfa0GZmo.html/snap/firefox/3358/usr/lib/firefox/firefox
sudo
User:
user
Integrity Level:
UNKNOWN
40664/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40678/snap/snapd/20290/usr/lib/snapd/snap-seccomp version-info/snap/snapd/20290/usr/lib/snapd/snap-seccompfirefox
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
40686/snap/snapd/20290/usr/lib/snapd/snap-confine --base core22 snap.firefox.firefox /usr/lib/snapd/snap-exec firefox /tmp/f6UKALOfa0GZmo.html/snap/snapd/20290/usr/lib/snapd/snap-confinefirefox
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40687dumpe2fs -h /dev/sda3/usr/sbin/dumpe2fsudisksd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40688snap-update-ns --from-snap-confine firefox/snap/snapd/20290/usr/lib/snapd/snap-update-nsfirefox
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40694dumpe2fs -h /dev/sda3/usr/sbin/dumpe2fsudisksd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
40695snap-update-ns --from-snap-confine --user-mounts firefox/snap/snapd/20290/usr/lib/snapd/snap-update-nsfirefox
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
50
DNS requests
94
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
91.189.91.98:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
40663
firefox
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
40663
firefox
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
40663
firefox
POST
200
142.250.186.67:80
http://o.pki.goog/s/wr3/cgo
unknown
whitelisted
40663
firefox
POST
200
184.24.77.71:80
http://r11.o.lencr.org/
unknown
whitelisted
40663
firefox
POST
200
184.24.77.77:80
http://r10.o.lencr.org/
unknown
whitelisted
40663
firefox
POST
200
142.250.186.67:80
http://o.pki.goog/we2
unknown
whitelisted
40663
firefox
POST
200
184.24.77.77:80
http://r10.o.lencr.org/
unknown
whitelisted
40663
firefox
POST
200
184.24.77.77:80
http://r10.o.lencr.org/
unknown
whitelisted
40663
firefox
POST
200
142.250.186.67:80
http://o.pki.goog/we2
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
91.189.91.98:80
Canonical Group Limited
US
unknown
484
avahi-daemon
224.0.0.251:5353
unknown
207.211.211.26:443
odrs.gnome.org
US
whitelisted
512
snapd
185.125.188.55:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
40663
firefox
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
40663
firefox
34.36.137.203:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
whitelisted
40663
firefox
142.250.186.67:80
o.pki.goog
GOOGLE
US
whitelisted
40663
firefox
184.24.77.77:80
r10.o.lencr.org
Akamai International B.V.
DE
whitelisted
40663
firefox
34.160.144.191:443
content-signature-2.cdn.mozilla.net
GOOGLE
US
whitelisted
40663
firefox
172.217.23.106:443
safebrowsing.googleapis.com
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
  • 2a00:1450:4001:82b::200e
whitelisted
connectivity-check.ubuntu.com
  • 2620:2d:4000:1::2a
  • 2620:2d:4002:1::197
  • 2620:2d:4002:1::196
  • 2620:2d:4000:1::97
  • 2620:2d:4000:1::96
  • 2001:67c:1562::24
  • 2620:2d:4000:1::22
  • 2620:2d:4002:1::198
  • 2620:2d:4000:1::98
  • 2620:2d:4000:1::2b
  • 2620:2d:4000:1::23
  • 2001:67c:1562::23
whitelisted
odrs.gnome.org
  • 207.211.211.26
  • 195.181.175.41
  • 212.102.56.178
  • 169.150.255.184
  • 195.181.170.19
  • 37.19.194.81
  • 169.150.255.180
  • 2a02:6ea0:c700::11
  • 2a02:6ea0:c700::107
  • 2a02:6ea0:c700::21
  • 2a02:6ea0:c700::19
  • 2a02:6ea0:c700::112
  • 2a02:6ea0:c700::18
  • 2a02:6ea0:c700::101
whitelisted
api.snapcraft.io
  • 185.125.188.55
  • 185.125.188.59
  • 185.125.188.58
  • 185.125.188.54
  • 2620:2d:4000:1010::42
  • 2620:2d:4000:1010::6d
  • 2620:2d:4000:1010::117
  • 2620:2d:4000:1010::344
whitelisted
detectportal.firefox.com
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 96.7.128.186
  • 23.215.0.133
  • 96.7.128.192
  • 23.215.0.132
  • 2600:1408:ec00:36::1736:7f2f
  • 2600:1408:ec00:36::1736:7f2e
  • 2600:1406:bc00:17::6007:810d
  • 2600:1406:bc00:17::6007:8128
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
contile.services.mozilla.com
  • 34.36.137.203
whitelisted
spocs.getpocket.com
  • 34.36.137.203
whitelisted
mc.prod.ads.prod.webservices.mozgcp.net
whitelisted

Threats

No threats detected
No debug info