URL:

example.com

Full analysis: https://app.any.run/tasks/e8ecaed5-b7c5-4827-bf56-2b10914d5b44
Verdict: Malicious activity
Analysis date: September 17, 2025, 17:28:50
OS: Ubuntu 22.04.2
Tags:
phishing
Indicators:
MD5:

5ABABD603B22780302DD8D83498E5172

SHA1:

0CAAF24AB1A0C33440C06AFE99DF986365B0781F

SHA256:

A379A6F6EEAFB9A55E378C118034E2751E682FAB9F2D30AB13D2125586CE1947

SSDEEP:

3:4VJT:4/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • systemd-resolved (PID: 418)
  • SUSPICIOUS

    • Executes commands using command-line interpreter

      • sudo (PID: 1903)
      • gnome-terminal-server (PID: 2119)
      • chrome (PID: 1906)
    • Reads passwd file

      • tnftp (PID: 2147)
      • tnftp (PID: 2174)
      • tnftp (PID: 2189)
      • dumpe2fs (PID: 2215)
      • curl (PID: 2191)
      • dumpe2fs (PID: 2216)
      • curl (PID: 2247)
      • curl (PID: 2276)
    • Checks the user who created the process

      • tnftp (PID: 2147)
      • tnftp (PID: 2189)
      • tnftp (PID: 2174)
    • Connects to FTP

      • tnftp (PID: 2189)
      • curl (PID: 2276)
    • Check the Environment Variables Related to System Identification (os-release)

      • curl (PID: 2191)
      • snap (PID: 2230)
      • curl (PID: 2247)
      • curl (PID: 2276)
    • Connection to a remote server via Netcat

      • bash (PID: 2137)
  • INFO

    • Checks timezone

      • chrome (PID: 1906)
      • python3.10 (PID: 2112)
      • tnftp (PID: 2147)
      • tnftp (PID: 2174)
      • tnftp (PID: 2189)
      • dumpe2fs (PID: 2215)
      • dumpe2fs (PID: 2216)
      • python3.10 (PID: 2229)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
242
Monitored processes
113
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
dash no specs sudo no specs chrome no specs locale-check no specs readlink no specs dirname no specs mkdir no specs cat no specs cat no specs chrome no specs chrome_crashpad_handler no specs chrome_crashpad_handler no specs chrome_crashpad_handler no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome no specs chrome chrome no specs chrome no specs chrome no specs dash no specs dbus-send no specs dash no specs dash no specs dash no specs basename no specs dash no specs dash no specs readlink no specs dash no specs grep no specs cut no specs dash no specs dbus-send no specs dash no specs dash no specs dash no specs mawk no specs cut no specs basename no specs dash no specs grep no specs cut no specs dash no specs dash no specs readlink no specs dash no specs dash no specs dbus-send no specs dash no specs dash no specs dash no specs chrome no specs mawk no specs cut no specs basename no specs dash no specs dash no specs readlink no specs grep no specs cut no specs dash no specs chrome no specs chrome no specs chrome no specs readlink no specs dirname no specs mkdir no specs cat no specs cat no specs systemctl no specs python3.10 no specs gnome-terminal.real no specs gnome-terminal-server no specs bash no specs dash no specs basename no specs dash no specs dirname no specs dircolors no specs tnftp no specs ubuntu-advantage-notification no specs tnftp #PHISHING systemd-resolved cron no specs dash no specs deja-dup-monitor no specs tnftp ping no specs curl snap-seccomp no specs snap-confine no specs dumpe2fs no specs dumpe2fs no specs snap-update-ns no specs bash no specs python3.10 no specs snap no specs nc.openbsd no specs nc.openbsd nslookup curl snap-seccomp no specs snap-confine no specs snap-confine no specs curl snap-seccomp no specs snap-confine no specs snap-confine no specs systemd-timedated no specs

Process information

PID
CMD
Path
Indicators
Parent process
418/lib/systemd/systemd-resolved/usr/lib/systemd/systemd-resolved
systemd
User:
systemd-resolve
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/systemd/systemd-resolved
/usr/lib/x86_64-linux-gnu/libpcre2-8.so.0.10.4
/usr/lib/x86_64-linux-gnu/libgmp.so.10.4.1
/usr/lib/x86_64-linux-gnu/libunistring.so.2.2.0
/usr/lib/x86_64-linux-gnu/libp11-kit.so.0.3.0
/usr/lib/x86_64-linux-gnu/libcrypto.so.3
/usr/lib/x86_64-linux-gnu/libcap-ng.so.0.0.0
/usr/lib/x86_64-linux-gnu/libaudit.so.1.0.0
/usr/lib/x86_64-linux-gnu/libhogweed.so.6.4
/usr/lib/x86_64-linux-gnu/libnettle.so.8.4
1902/bin/sh -c "DISPLAY=:0 sudo -iu user google-chrome example\.com "/usr/bin/dashzhqBI23Omt06cXXL
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
1903sudo -iu user google-chrome example.com/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libaudit.so.1.0.0
/usr/lib/x86_64-linux-gnu/libselinux.so.1
/usr/libexec/sudo/libsudo_util.so.0.0.0
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libcap-ng.so.0.0.0
/usr/lib/x86_64-linux-gnu/libpcre2-8.so.0.10.4
/usr/lib/x86_64-linux-gnu/libnss_systemd.so.2
/usr/libexec/sudo/sudoers.so
/usr/lib/x86_64-linux-gnu/libpam.so.0.85.1
/usr/lib/x86_64-linux-gnu/libz.so.1.2.11
1906/usr/bin/google-chrome example.com/opt/google/chrome/chromesudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libtinfo.so.6.3
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libdl.so.2
/usr/lib/x86_64-linux-gnu/libpthread.so.0
/usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0.7200.4
/usr/lib/x86_64-linux-gnu/libglib-2.0.so.0.7200.4
/usr/lib/x86_64-linux-gnu/libnss3.so
/usr/lib/x86_64-linux-gnu/libnssutil3.so
/usr/lib/x86_64-linux-gnu/libsmime3.so
/usr/lib/x86_64-linux-gnu/libnspr4.so
1907/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkchrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
1908readlink -f /usr/bin/google-chrome/usr/bin/readlinkchrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
1909dirname /opt/google/chrome/google-chrome/usr/bin/dirnamechrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
1910mkdir -p /home/user/.local/share/applications/usr/bin/mkdirchrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libselinux.so.1
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libpcre2-8.so.0.10.4
1911cat/usr/bin/catchrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
1912cat/usr/bin/catchrome
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
Executable files
0
Suspicious files
98
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
1906chrome/home/user/.config/google-chrome/ShaderCache/data_3binary
MD5:
SHA256:
1906chrome/home/user/.config/google-chrome/ShaderCache/data_2binary
MD5:
SHA256:
1906chrome/home/user/.config/google-chrome/ShaderCache/data_0binary
MD5:
SHA256:
1906chrome/home/user/.config/google-chrome/Default/Sync Data/LevelDB/MANIFEST-000001binary
MD5:
SHA256:
1906chrome/home/user/.config/google-chrome/Default/shared_proto_db/metadata/MANIFEST-000001binary
MD5:
SHA256:
1906chrome/home/user/.config/google-chrome/Default/Extension State/MANIFEST-000001binary
MD5:
SHA256:
1906chrome/home/user/.config/google-chrome/Default/shared_proto_db/MANIFEST-000001binary
MD5:
SHA256:
1906chrome/home/user/.config/google-chrome/GrShaderCache/data_3binary
MD5:
SHA256:
1906chrome/home/user/.config/google-chrome/GrShaderCache/data_0binary
MD5:
SHA256:
1906chrome/home/user/.config/google-chrome/GrShaderCache/data_2binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
50
DNS requests
36
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2191
curl
GET
302
108.179.194.74:80
http://108.179.194.74/
unknown
unknown
GET
204
91.189.91.98:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
2247
curl
GET
302
108.179.194.74:80
http://108.179.194.74/
unknown
unknown
481
NetworkManager
GET
204
185.125.190.98:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
477
avahi-daemon
224.0.0.251:5353
whitelisted
79.127.216.204:443
odrs.gnome.org
Ipex Ltd.
CZ
whitelisted
185.125.190.17:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
91.189.91.98:80
connectivity-check.ubuntu.com
Canonical Group Limited
US
whitelisted
185.125.190.58:123
ntp.ubuntu.com
unknown
195.181.170.18:443
odrs.gnome.org
Datacamp Limited
DE
whitelisted
185.125.188.58:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
185.125.188.57:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
185.125.188.59:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
496
snapd
185.125.188.58:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted

DNS requests

Domain
IP
Reputation
odrs.gnome.org
  • 79.127.216.204
  • 195.181.170.18
  • 79.127.211.90
  • 212.102.56.179
  • 195.181.175.40
  • 37.19.194.81
  • 2a02:6ea0:c77a::47
  • 2a02:6ea0:c700::11
  • 2a02:6ea0:c700::19
  • 2a02:6ea0:c77a::48
  • 2a02:6ea0:c700::21
  • 2a02:6ea0:c700::101
whitelisted
google.com
  • 142.250.186.78
  • 2a00:1450:4001:828::200e
whitelisted
ntp.ubuntu.com
  • 185.125.190.58
  • 91.189.91.157
  • 185.125.190.57
  • 185.125.190.56
  • 2620:2d:4000:1::41
  • 2620:2d:4000:1::40
  • 2620:2d:4000:1::3f
unknown
connectivity-check.ubuntu.com
  • 91.189.91.98
  • 91.189.91.49
  • 91.189.91.96
  • 185.125.190.98
  • 185.125.190.49
  • 91.189.91.97
  • 185.125.190.18
  • 185.125.190.17
  • 185.125.190.97
  • 185.125.190.96
  • 91.189.91.48
  • 185.125.190.48
  • 2620:2d:4000:1::2b
  • 2620:2d:4000:1::96
  • 2620:2d:4000:1::2a
  • 2620:2d:4002:1::196
  • 2620:2d:4000:1::23
  • 2001:67c:1562::23
  • 2620:2d:4000:1::98
  • 2001:67c:1562::24
  • 2620:2d:4000:1::22
  • 2620:2d:4002:1::198
  • 2620:2d:4002:1::197
  • 2620:2d:4000:1::97
whitelisted
api.snapcraft.io
  • 185.125.188.58
  • 185.125.188.59
  • 185.125.188.54
  • 185.125.188.57
  • 2620:2d:4000:1010::42
  • 2620:2d:4000:1010::117
  • 2620:2d:4000:1010::2d6
  • 2620:2d:4000:1010::2e6
whitelisted
clientservices.googleapis.com
  • 142.250.185.99
whitelisted
safebrowsingohttpgateway.googleapis.com
  • 172.217.16.202
  • 142.250.185.74
  • 216.58.206.42
  • 142.250.186.74
  • 142.250.186.42
  • 142.250.185.234
  • 142.250.185.170
  • 142.250.74.202
  • 142.250.186.138
  • 142.250.185.106
  • 142.250.181.234
  • 172.217.23.106
  • 142.250.185.138
  • 142.250.186.106
  • 142.250.185.202
  • 216.58.206.74
whitelisted
example.com
  • 23.215.0.138
  • 23.215.0.136
  • 23.192.228.84
  • 23.220.75.232
  • 23.220.75.245
  • 23.192.228.80
whitelisted
accounts.google.com
  • 142.250.27.84
whitelisted
google-ohttp-relay-safebrowsing.fastly-edge.com
  • 151.101.193.91
  • 151.101.129.91
  • 151.101.65.91
  • 151.101.1.91
unknown

Threats

PID
Process
Class
Message
1952
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
1952
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
1952
chrome
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
418
systemd-resolved
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected AllBass Phishing (smhrc .com)
418
systemd-resolved
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected AllBass Phishing (smhrc .com)
418
systemd-resolved
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected AllBass Phishing (smhrc .com)
2191
curl
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
418
systemd-resolved
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected AllBass Phishing (smhrc .com)
2247
curl
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
418
systemd-resolved
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected AllBass Phishing (smhrc .com)
No debug info