File name:

Fantazy.x86

Full analysis: https://app.any.run/tasks/0ee28897-8658-4cbd-8661-77ea0dccc622
Verdict: Malicious activity
Threats:

A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.

Analysis date: January 05, 2025, 16:23:08
OS: Ubuntu 22.04.2 LTS
Tags:
mirai
botnet
Indicators:
MIME: application/x-executable
File info: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
MD5:

9A58836855E1D012DDBDC736FD9684E9

SHA1:

8883A0B923F9F78B9EE2F04BFB762DDB5B91C703

SHA256:

BB902EE8A178297EF2163CF647E4BA180BAC25EA5A1021EE90ADD0DB08736511

SSDEEP:

3072:7b0tynAGclTzwXANlNcEQqhnWUkef2CNGr8:7bSynAGclTzwXANlNcE7FWUBfXz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • MIRAI has been detected (SURICATA)

      • Fantazy.x86.elf (PID: 38754)
  • SUSPICIOUS

    • Checks DMI information (probably VM detection)

      • pipewire (PID: 38792)
      • pulseaudio (PID: 38794)
      • udevadm (PID: 38835)
      • systemd-hostnamed (PID: 39056)
      • gnome-shell (PID: 38888)
      • udevadm (PID: 39196)
      • udevadm (PID: 39197)
    • Reads /proc/mounts (likely used to find writable filesystems)

      • fusermount3 (PID: 38833)
      • dbus-daemon (PID: 38803)
      • gjs-console (PID: 38974)
      • dbus-daemon (PID: 38825)
      • gnome-shell (PID: 38888)
      • fusermount3 (PID: 38857)
      • dbus-daemon (PID: 38918)
      • gjs-console (PID: 39150)
    • Checks the user who created the process

      • systemd (PID: 38785)
    • Connects to unusual port

      • Fantazy.x86.elf (PID: 38754)
    • Modifies file or directory owner

      • sudo (PID: 38743)
    • Contacting a server suspected of hosting an CnC

      • Fantazy.x86.elf (PID: 38754)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.o | ELF Executable and Linkable format (generic) (49.8)

EXIF

EXE

CPUArchitecture: 32 bit
CPUByteOrder: Little endian
ObjectFileType: Executable file
CPUType: i386
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
344
Monitored processes
137
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs chown no specs chmod no specs sudo no specs fantazy.x86.elf no specs locale-check no specs fantazy.x86.elf no specs #MIRAI fantazy.x86.elf fantazy.x86.elf no specs fantazy.x86.elf no specs fantazy.x86.elf no specs systemctl no specs systemctl no specs systemctl no specs dash no specs gdm-session-worker no specs dash no specs dash no specs systemd-user-runtime-dir no specs systemd no specs systemd no specs systemd no specs systemd no specs 30-systemd-environment-d-generator no specs systemd-xdg-autostart-generator no specs systemctl no specs pipewire no specs pipewire-media-session no specs pulseaudio no specs snap no specs tracker-extract-3 no specs gdm-wayland-session no specs dbus-daemon no specs gvfsd no specs snap-seccomp no specs dbus-run-session no specs dbus-daemon no specs gvfsd no specs gvfsd-fuse no specs gnome-session-binary no specs fusermount3 no specs udevadm no specs gst-plugin-scanner no specs xdg-document-portal no specs gst-plugin-scanner no specs xdg-permission-store no specs session-migration no specs fusermount3 no specs dash no specs gsettings no specs snap-confine no specs snap-confine no specs snap-update-ns no specs gsettings no specs python3.10 no specs python3.10 no specs dash no specs gsettings no specs gsettings no specs gnome-shell no specs tracker-miner-fs-3 no specs dbus-daemon no specs at-spi-bus-launcher no specs dbus-daemon no specs gvfs-udisks2-volume-monitor no specs xwayland no specs gvfs-mtp-volume-monitor no specs gvfs-gphoto2-volume-monitor no specs gvfs-goa-volume-monitor no specs dbus-daemon no specs goa-daemon no specs dbus-daemon no specs goa-identity-service no specs gvfs-afc-volume-monitor no specs systemd-localed no specs dbus-daemon no specs xdg-permission-store no specs geoclue no specs dbus-daemon no specs dbus-daemon no specs gjs-console no specs at-spi2-registryd no specs gsd-sharing no specs gsd-wacom no specs ibus-daemon no specs gsd-color no specs gsd-keyboard no specs gsd-print-notifications no specs gsd-rfkill no specs gsd-smartcard no specs gsd-datetime no specs gsd-media-keys no specs gsd-screensaver-proxy no specs gsd-sound no specs python3.10 no specs gsd-a11y-settings no specs gsd-housekeeping no specs gsd-power no specs systemd-hostnamed no specs dbus-daemon no specs false no specs gsd-print-notifications no specs gsd-printer no specs dash no specs xkbcomp no specs ibus-engine-m17n no specs fprintd no specs ibus-daemon no specs dash no specs python3.10 no specs xkbcomp no specs ibus-engine-mozc no specs ibus-engine-m17n no specs ibus-engine-unikey no specs spice-vdagent no specs xbrlapi no specs dbus-daemon no specs gvfsd no specs ibus-dconf no specs dbus-daemon no specs ibus-portal no specs ibus-engine-mozc no specs ibus-engine-unikey no specs ibus-dconf no specs ibus-daemon no specs dbus-daemon no specs ibus-x11 no specs ibus-portal no specs dbus-daemon no specs gjs-console no specs ibus-engine-simple no specs tracker-extract-3 no specs gvfsd-metadata no specs systemd-user-runtime-dir no specs udevadm no specs udevadm no specs

Process information

PID
CMD
Path
Indicators
Parent process
38742/bin/sh -c "sudo chown user /tmp/Fantazy\.x86\.elf && chmod +x /tmp/Fantazy\.x86\.elf && DISPLAY=:0 sudo -iu user /tmp/Fantazy\.x86\.elf "/usr/bin/dashany-guest-agent
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38743sudo chown user /tmp/Fantazy.x86.elf/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38747chown user /tmp/Fantazy.x86.elf/usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38748chmod +x /tmp/Fantazy.x86.elf/usr/bin/chmoddash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38749sudo -iu user /tmp/Fantazy.x86.elf/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38751/tmp/Fantazy.x86.elf/tmp/Fantazy.x86.elfsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38752/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkFantazy.x86.elf
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38753 tmp/Fantazy.x86.elf/tmp/Fantazy.x86.elfFantazy.x86.elf
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38754 tmp/Fantazy.x86.elf/tmp/Fantazy.x86.elf
Fantazy.x86.elf
User:
user
Integrity Level:
UNKNOWN
Exit code:
9
38755 tmp/Fantazy.x86.elf/tmp/Fantazy.x86.elfFantazy.x86.elf
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
60
Text files
9
Unknown types
1

Dropped files

PID
Process
Filename
Type
38794pulseaudio/var/lib/gdm3/.cache/gstreamer-1.0/registry.x86_64.bin (deleted)binary
MD5:
SHA256:
38794pulseaudio/var/lib/gdm3/.config/pulse/cookiebinary
MD5:
SHA256:
38897tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/meta.dbbinary
MD5:
SHA256:
38897tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/meta.db-journal (deleted)binary
MD5:
SHA256:
38897tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/ontologies.gvdbbinary
MD5:
SHA256:
38897tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/meta.db-shmbinary
MD5:
SHA256:
38888gnome-shell/tmp/.X1024-locktext
MD5:
SHA256:
38888gnome-shell/tmp/.X1025-locktext
MD5:
SHA256:
38897tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/http%3A%2F%2Ftracker.api.gnome.org%2Fontology%2Fv3%2Ftracker%23FileSystem.db-journal (deleted)binary
MD5:
SHA256:
38897tracker-miner-fs-3/var/lib/gdm3/.cache/tracker3/files/http%3A%2F%2Ftracker.api.gnome.org%2Fontology%2Fv3%2Ftracker%23FileSystem.dbbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
9
DNS requests
9
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
185.125.190.97:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
204
185.125.190.97:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
484
avahi-daemon
224.0.0.251:5353
unknown
185.125.190.97:80
Canonical Group Limited
GB
unknown
1178
snap-store
195.181.175.41:443
odrs.gnome.org
Datacamp Limited
DE
whitelisted
38754
Fantazy.x86.elf
41.216.189.127:63645
Private-Hosting di Cipriano oscar
DE
unknown
512
snapd
185.125.188.59:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
512
snapd
185.125.188.55:443
api.snapcraft.io
Canonical Group Limited
GB
unknown
512
snapd
185.125.188.54:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
  • 2a00:1450:4001:80b::200e
whitelisted
odrs.gnome.org
  • 195.181.175.41
  • 169.150.255.180
  • 212.102.56.179
  • 195.181.170.19
  • 207.211.211.26
  • 37.19.194.81
  • 169.150.255.183
  • 2a02:6ea0:c700::19
  • 2a02:6ea0:c700::11
  • 2a02:6ea0:c700::107
  • 2a02:6ea0:c700::101
  • 2a02:6ea0:c700::21
  • 2a02:6ea0:c700::18
  • 2a02:6ea0:c700::112
whitelisted
api.snapcraft.io
  • 185.125.188.59
  • 185.125.188.55
  • 185.125.188.58
  • 185.125.188.54
  • 2620:2d:4000:1010::42
  • 2620:2d:4000:1010::117
  • 2620:2d:4000:1010::2e6
  • 2620:2d:4000:1010::6d
whitelisted
171.100.168.192.in-addr.arpa
unknown
connectivity-check.ubuntu.com
  • 2620:2d:4000:1::98
  • 2620:2d:4000:1::96
  • 2620:2d:4002:1::196
  • 2620:2d:4000:1::2b
  • 2620:2d:4002:1::197
  • 2620:2d:4000:1::97
  • 2001:67c:1562::23
  • 2620:2d:4002:1::198
  • 2620:2d:4000:1::22
  • 2620:2d:4000:1::23
  • 2620:2d:4000:1::2a
  • 2001:67c:1562::24
unknown

Threats

PID
Process
Class
Message
38754
Fantazy.x86.elf
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Possible Mirai.Gen (Linux)
38754
Fantazy.x86.elf
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Possible Mirai.Gen (Linux)
No debug info