File name:

SH1.zip

Full analysis: https://app.any.run/tasks/94d89f0f-fc2a-4c12-8ce9-388ed3654fd8
Verdict: Malicious activity
Threats:

A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.

Analysis date: May 19, 2025, 03:47:15
OS: Ubuntu 22.04.2
Tags:
mirai
botnet
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
MD5:

96A40592135647B3F9ACD18D2B49BA7E

SHA1:

906B5838BB0F267BB9AFE1742E655170BDA5408F

SHA256:

B2C8C7CD3F5A5C99E632EEFDA64F02F91651948B18363072477A8269AFB6C0CC

SSDEEP:

12:5fGyfTQkydxxufLuScOESM+a7gYOKpY1QlfhkkydxxPa4:HkkOxufylO3MlrOKpphkkOxl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • MIRAI has been detected (SURICATA)

      • curl (PID: 40123)
  • SUSPICIOUS

    • Executes commands using command-line interpreter

      • sudo (PID: 39851)
      • gnome-terminal-server (PID: 40024)
      • bash (PID: 40042)
      • sudo (PID: 40082)
      • bash (PID: 40083)
    • Check the Environment Variables Related to System Identification (os-release)

      • curl (PID: 40085)
      • curl (PID: 40123)
      • curl (PID: 40155)
      • curl (PID: 40184)
      • curl (PID: 40214)
      • curl (PID: 40246)
      • curl (PID: 40278)
      • curl (PID: 40430)
      • curl (PID: 40337)
      • curl (PID: 40368)
      • curl (PID: 40399)
      • curl (PID: 40308)
      • curl (PID: 40460)
      • curl (PID: 40488)
      • curl (PID: 40518)
    • Checks DMI information (probably VM detection)

      • gnome-shell-portal-helper (PID: 39874)
      • WebKitWebProcess (PID: 39910)
    • Reads /proc/mounts (likely used to find writable filesystems)

      • gnome-shell-portal-helper (PID: 39874)
    • Reads passwd file

      • WebKitWebProcess (PID: 39910)
      • dumpe2fs (PID: 40104)
      • dumpe2fs (PID: 40113)
      • curl (PID: 40085)
      • curl (PID: 40123)
      • curl (PID: 40155)
      • curl (PID: 40184)
      • curl (PID: 40214)
      • curl (PID: 40246)
      • curl (PID: 40278)
      • curl (PID: 40337)
      • curl (PID: 40368)
      • curl (PID: 40308)
      • curl (PID: 40430)
      • curl (PID: 40399)
      • curl (PID: 40460)
      • curl (PID: 40488)
      • curl (PID: 40518)
    • Creates shell script file

      • 7z (PID: 39988)
    • Uses wget to download content

      • bash (PID: 40083)
    • Connects to the server without a host name

      • curl (PID: 40155)
      • curl (PID: 40184)
      • wget (PID: 40245)
      • wget (PID: 40213)
      • curl (PID: 40246)
      • wget (PID: 40277)
      • curl (PID: 40308)
      • wget (PID: 40336)
  • INFO

    • Checks timezone

      • file-roller (PID: 39852)
      • 7z (PID: 39867)
      • python3.10 (PID: 40018)
      • 7z (PID: 39988)
      • dumpe2fs (PID: 40104)
      • wget (PID: 40084)
      • dumpe2fs (PID: 40113)
      • wget (PID: 40122)
      • wget (PID: 40154)
      • wget (PID: 40183)
      • wget (PID: 40213)
      • wget (PID: 40245)
      • wget (PID: 40277)
      • wget (PID: 40336)
      • wget (PID: 40367)
      • wget (PID: 40398)
      • wget (PID: 40429)
      • wget (PID: 40307)
      • wget (PID: 40459)
      • wget (PID: 40487)
      • wget (PID: 40517)
    • Creates file in the temporary folder

      • curl (PID: 40085)
      • cat (PID: 40118)
      • cat (PID: 40150)
      • curl (PID: 40123)
      • curl (PID: 40155)
      • curl (PID: 40184)
      • curl (PID: 40214)
      • cat (PID: 40241)
      • curl (PID: 40246)
      • cat (PID: 40273)
      • curl (PID: 40278)
      • cat (PID: 40303)
      • cat (PID: 40209)
      • cat (PID: 40179)
      • curl (PID: 40308)
      • cat (PID: 40332)
      • cat (PID: 40394)
      • cat (PID: 40363)
      • curl (PID: 40337)
      • curl (PID: 40399)
      • curl (PID: 40368)
      • cat (PID: 40455)
      • cat (PID: 40425)
      • curl (PID: 40430)
      • cat (PID: 40483)
      • curl (PID: 40460)
      • curl (PID: 40488)
      • cat (PID: 40513)
      • curl (PID: 40518)
      • cat (PID: 40545)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 51
ZipBitFlag: 0x0003
ZipCompression: Unknown (99)
ZipModifyDate: 2025:05:19 03:46:12
ZipCRC: 0xd4e3c650
ZipCompressedSize: 313
ZipUncompressedSize: 2940
ZipFileName: 92e6bd4a0f55b50f287e31bf824ea4fe7302f3dbca37493e1a00c70d0f13ca36.sh
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
293
Monitored processes
165
Malicious processes
3
Suspicious processes
5

Behavior graph

Click at the process to see the details
dash no specs sudo no specs file-roller no specs locale-check no specs 7z no specs nm-dispatcher no specs dbus-daemon no specs gnome-shell-portal-helper no specs dash no specs dash no specs webkitnetworkprocess gnome-shell-portal-helper no specs bwrap no specs bwrap no specs xdg-dbus-proxy no specs bwrap no specs bwrap no specs webkitwebprocess no specs systemd-hostnamed no specs gvfsd-network no specs gvfsd-smb-browse gvfsd-dnssd no specs 7z no specs tracker-extract-3 no specs dbus-daemon no specs nautilus no specs python3.10 no specs gnome-terminal.real no specs gnome-terminal-server no specs bash no specs dash no specs basename no specs dash no specs dirname no specs dircolors no specs bash no specs sudo no specs sudo no specs dbus-daemon no specs nautilus no specs sudo no specs sudo no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs dumpe2fs no specs snap-update-ns no specs dumpe2fs no specs cat no specs chmod no specs bash no specs wget #MIRAI curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs wget curl snap-seccomp no specs snap-confine no specs snap-confine no specs cat no specs chmod no specs bash no specs

Process information

PID
CMD
Path
Indicators
Parent process
39850/bin/sh -c "DISPLAY=:0 sudo -iu user file-roller /tmp/SH1\.zip "/usr/bin/dashoF5qt7VjSoEVMhQn
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
39851sudo -iu user file-roller /tmp/SH1.zip/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libaudit.so.1.0.0
/usr/lib/x86_64-linux-gnu/libselinux.so.1
/usr/libexec/sudo/libsudo_util.so.0.0.0
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libcap-ng.so.0.0.0
/usr/lib/x86_64-linux-gnu/libpcre2-8.so.0.10.4
/usr/lib/x86_64-linux-gnu/libnss_systemd.so.2
/usr/libexec/sudo/sudoers.so
/usr/lib/x86_64-linux-gnu/libpam.so.0.85.1
/usr/lib/x86_64-linux-gnu/libz.so.1.2.11
39852file-roller /tmp/SH1.zip/usr/bin/file-rollersudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libtinfo.so.6.3
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libglib-2.0.so.0.7200.4
/usr/lib/x86_64-linux-gnu/libgtk-3.so.0.2404.29
/usr/lib/x86_64-linux-gnu/libgdk-3.so.0.2404.29
/usr/lib/x86_64-linux-gnu/libpango-1.0.so.0.5000.6
/usr/lib/x86_64-linux-gnu/libcairo.so.2.11600.0
/usr/lib/x86_64-linux-gnu/libgdk_pixbuf-2.0.so.0.4200.8
/usr/lib/x86_64-linux-gnu/libgio-2.0.so.0.7200.4
/usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0.7200.4
39853/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkfile-roller
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
39867/usr/lib/p7zip/7z l -slt -bd -y -- /tmp/SH1.zip/usr/lib/p7zip/7zfile-roller
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libpthread.so.0
/usr/lib/x86_64-linux-gnu/libdl.so.2
/usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.30
/usr/lib/x86_64-linux-gnu/libgcc_s.so.1
/usr/lib/x86_64-linux-gnu/libm.so.6
/usr/lib/p7zip/7z.so
/usr/lib/p7zip/codecs/rar.so
39872/usr/lib/NetworkManager/nm-dispatcher/usr/lib/NetworkManager/nm-dispatchersystemd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libnm.so.0.1.0
/usr/lib/x86_64-linux-gnu/libgio-2.0.so.0.7200.4
/usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0.7200.4
/usr/lib/x86_64-linux-gnu/libglib-2.0.so.0.7200.4
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libgnutls.so.30.31.0
/usr/lib/x86_64-linux-gnu/libgmodule-2.0.so.0.7200.4
/usr/lib/x86_64-linux-gnu/libudev.so.1.7.2
/usr/lib/x86_64-linux-gnu/libz.so.1.2.11
/usr/lib/x86_64-linux-gnu/libmount.so.1.1.0
39873/usr/bin/dbus-daemon --session --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only/usr/bin/dbus-daemondbus-daemon
User:
user
Integrity Level:
UNKNOWN
Exit code:
9
39874/usr/libexec/gnome-shell-portal-helper/usr/libexec/gnome-shell-portal-helperdbus-daemon
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libgio-2.0.so.0.7200.4
/usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0.7200.4
/usr/lib/x86_64-linux-gnu/libglib-2.0.so.0.7200.4
/usr/lib/x86_64-linux-gnu/libgjs.so.0.0.0
/usr/lib/x86_64-linux-gnu/libc.so.6
/usr/lib/x86_64-linux-gnu/libgmodule-2.0.so.0.7200.4
/usr/lib/x86_64-linux-gnu/libz.so.1.2.11
/usr/lib/x86_64-linux-gnu/libmount.so.1.1.0
/usr/lib/x86_64-linux-gnu/libselinux.so.1
/usr/lib/x86_64-linux-gnu/libffi.so.8.1.0
39883/bin/sh -e /etc/NetworkManager/dispatcher.d/01-ifupdown connectivity-change/usr/bin/dashnm-dispatcher
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
39884/bin/sh -e /etc/NetworkManager/dispatcher.d/01-ifupdown connectivity-change/usr/bin/dashnm-dispatcher
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Modules
Images
/usr/lib/x86_64-linux-gnu/libc.so.6
Executable files
0
Suspicious files
4
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
40008nautilus/home/user/.local/share/nautilus/tags/meta.dbbinary
MD5:
SHA256:
40059nautilus/home/user/.local/share/nautilus/tags/meta.dbbinary
MD5:
SHA256:
39852file-roller/home/user/.local/share/recently-used.xbelxml
MD5:
SHA256:
399887z/home/user/Desktop/92e6bd4a0f55b50f287e31bf824ea4fe7302f3dbca37493e1a00c70d0f13ca36.shtext
MD5:
SHA256:
40008nautilus/home/user/.local/share/nautilus/tags/meta.db-shm (deleted)binary
MD5:
SHA256:
40059nautilus/home/user/.local/share/nautilus/tags/meta.db-shm (deleted)binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
40
TCP/UDP connections
44
DNS requests
21
Threats
46

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
488
NetworkManager
GET
404
185.125.190.49:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
488
NetworkManager
GET
404
185.125.190.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
488
NetworkManager
GET
404
185.125.190.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
39892
WebKitNetworkProcess
GET
404
151.101.65.91:80
http://nmcheck.gnome.org/
unknown
whitelisted
488
NetworkManager
GET
404
185.125.190.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
488
NetworkManager
GET
404
185.125.190.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
488
NetworkManager
GET
404
185.125.190.96:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
488
NetworkManager
GET
404
185.125.190.48:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
488
NetworkManager
GET
404
91.189.91.49:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
40084
wget
GET
404
93.95.115.175:80
http://93.95.115.175/hiddenbin/boatnet.x86
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
484
avahi-daemon
224.0.0.251:5353
unknown
488
NetworkManager
185.125.190.49:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
39892
WebKitNetworkProcess
151.101.65.91:80
nmcheck.gnome.org
FASTLY
US
whitelisted
488
NetworkManager
185.125.190.96:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
488
NetworkManager
185.125.190.48:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
39962
gvfsd-smb-browse
192.168.100.255:137
whitelisted
488
NetworkManager
91.189.91.49:80
connectivity-check.ubuntu.com
Canonical Group Limited
US
whitelisted
40084
wget
93.95.115.175:80
NL
unknown
40085
curl
93.95.115.175:80
NL
unknown
40122
wget
93.95.115.175:80
NL
unknown

DNS requests

Domain
IP
Reputation
connectivity-check.ubuntu.com
  • 185.125.190.49
  • 91.189.91.48
  • 185.125.190.96
  • 185.125.190.18
  • 185.125.190.17
  • 91.189.91.98
  • 91.189.91.49
  • 185.125.190.97
  • 91.189.91.96
  • 185.125.190.48
  • 185.125.190.98
  • 2620:2d:4000:1::97
  • 2620:2d:4000:1::23
  • 2620:2d:4000:1::2b
  • 2001:67c:1562::24
  • 2620:2d:4002:1::196
  • 2620:2d:4000:1::22
  • 2620:2d:4000:1::98
  • 2001:67c:1562::23
  • 2620:2d:4000:1::96
  • 2620:2d:4000:1::2a
  • 2620:2d:4002:1::198
whitelisted
google.com
  • 142.250.186.142
  • 2a00:1450:4001:82a::200e
whitelisted
4.100.168.192.in-addr.arpa
unknown
nmcheck.gnome.org
  • 151.101.65.91
  • 151.101.193.91
  • 151.101.1.91
  • 151.101.129.91
  • 2a04:4e42:400::347
  • 2a04:4e42:600::347
  • 2a04:4e42::347
  • 2a04:4e42:200::347
whitelisted

Threats

PID
Process
Class
Message
40084
wget
Potentially Bad Traffic
ET INFO x86 File Download Request from IP Address
40084
wget
Potentially Bad Traffic
ET HUNTING Suspicious GET Request for .x86
40085
curl
Potentially Bad Traffic
ET HUNTING Suspicious GET Request for .x86
40085
curl
Potentially Bad Traffic
ET INFO x86 File Download Request from IP Address
40085
curl
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
40123
curl
A Network Trojan was detected
AV INFO Possible Mirai .mips Executable Download
40155
curl
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
40123
curl
Potentially Bad Traffic
ET INFO MIPS File Download Request from IP Address
40245
wget
Potentially Bad Traffic
ET INFO X86_64 File Download Request from IP Address
40213
wget
Potentially Bad Traffic
ET HUNTING Suspicious GET Request for .i686 File
No debug info