File name:

message.txt

Full analysis: https://app.any.run/tasks/8029aebf-c157-45ad-a970-2767e78878bd
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 05, 2025, 08:18:06
OS: Ubuntu 22.04.2
Tags:
loader
Indicators:
MIME: text/plain
File info: ASCII text
MD5:

7E75CE6ADEF9A41E70ADF90878D4F127

SHA1:

9FFCEFE691183A097E77D60AFCFDE35E46EECB8B

SHA256:

DE8FCC44317CB5C16AC750A9B5680C0B84869D1623B9B1F0977DCDA9B0AC6DF2

SSDEEP:

96:W3IzmmVkE66h4SXfRoNtMyXSHhAaHvMBVLm7NVMDkI:n3aN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes commands using command-line interpreter

      • sudo (PID: 39495)
      • gnome-terminal-server (PID: 39564)
    • Reads profile file

      • gnome-text-editor (PID: 39496)
    • Uses wget to download content

      • bash (PID: 39582)
    • Process drops legitimate windows executable

      • wget (PID: 39592)
      • busybox (PID: 39615)
      • busybox (PID: 39620)
      • busybox (PID: 39604)
      • busybox (PID: 39625)
      • busybox (PID: 39610)
      • busybox (PID: 39630)
      • busybox (PID: 39635)
      • busybox (PID: 39640)
      • busybox (PID: 39650)
      • busybox (PID: 39655)
      • busybox (PID: 39645)
      • busybox (PID: 39680)
      • busybox (PID: 39660)
      • busybox (PID: 39665)
      • busybox (PID: 39670)
      • busybox (PID: 39675)
      • busybox (PID: 39685)
      • busybox (PID: 39690)
      • busybox (PID: 39695)
      • busybox (PID: 39700)
      • busybox (PID: 39715)
      • busybox (PID: 39705)
      • busybox (PID: 39710)
      • busybox (PID: 39720)
      • busybox (PID: 39725)
      • busybox (PID: 39730)
      • busybox (PID: 39735)
      • busybox (PID: 39740)
    • Executable content was dropped or overwritten

      • wget (PID: 39592)
      • busybox (PID: 39604)
      • busybox (PID: 39610)
      • busybox (PID: 39615)
      • busybox (PID: 39625)
      • busybox (PID: 39620)
      • busybox (PID: 39640)
      • busybox (PID: 39650)
      • busybox (PID: 39655)
      • busybox (PID: 39645)
      • busybox (PID: 39660)
      • busybox (PID: 39665)
      • busybox (PID: 39670)
      • busybox (PID: 39675)
      • busybox (PID: 39685)
      • busybox (PID: 39690)
      • busybox (PID: 39695)
      • busybox (PID: 39680)
      • busybox (PID: 39630)
      • busybox (PID: 39635)
      • busybox (PID: 39705)
      • busybox (PID: 39700)
      • busybox (PID: 39710)
      • busybox (PID: 39715)
      • busybox (PID: 39720)
      • busybox (PID: 39725)
      • busybox (PID: 39730)
      • busybox (PID: 39735)
      • busybox (PID: 39740)
    • Executes the "rm" command to delete files or directories

      • bash (PID: 39582)
    • Potential Corporate Privacy Violation

      • wget (PID: 39592)
      • busybox (PID: 39604)
      • busybox (PID: 39610)
      • busybox (PID: 39620)
      • busybox (PID: 39630)
      • busybox (PID: 39635)
      • busybox (PID: 39625)
      • busybox (PID: 39640)
      • busybox (PID: 39645)
      • busybox (PID: 39650)
      • busybox (PID: 39665)
      • busybox (PID: 39680)
      • busybox (PID: 39670)
      • busybox (PID: 39675)
      • busybox (PID: 39685)
      • busybox (PID: 39655)
      • busybox (PID: 39660)
      • busybox (PID: 39615)
      • busybox (PID: 39690)
      • busybox (PID: 39695)
      • busybox (PID: 39710)
      • busybox (PID: 39705)
      • busybox (PID: 39700)
      • busybox (PID: 39730)
      • busybox (PID: 39720)
      • busybox (PID: 39725)
      • busybox (PID: 39735)
      • busybox (PID: 39740)
      • busybox (PID: 39593)
    • Connects to the server without a host name

      • busybox (PID: 39625)
      • busybox (PID: 39615)
      • busybox (PID: 39604)
      • busybox (PID: 39620)
      • busybox (PID: 39610)
      • busybox (PID: 39635)
      • busybox (PID: 39650)
      • busybox (PID: 39640)
      • busybox (PID: 39630)
      • busybox (PID: 39645)
      • busybox (PID: 39655)
      • busybox (PID: 39660)
      • busybox (PID: 39685)
      • busybox (PID: 39670)
      • busybox (PID: 39675)
      • busybox (PID: 39680)
      • busybox (PID: 39593)
      • wget (PID: 39592)
      • busybox (PID: 39665)
      • busybox (PID: 39700)
      • busybox (PID: 39690)
      • busybox (PID: 39705)
      • busybox (PID: 39695)
      • busybox (PID: 39730)
      • busybox (PID: 39710)
      • busybox (PID: 39715)
      • busybox (PID: 39720)
      • busybox (PID: 39725)
      • busybox (PID: 39735)
      • busybox (PID: 39740)
  • INFO

    • Checks timezone

      • python3.10 (PID: 39556)
      • wget (PID: 39592)
    • The sample compiled with english language support

      • busybox (PID: 39615)
      • wget (PID: 39592)
      • busybox (PID: 39620)
      • busybox (PID: 39610)
      • busybox (PID: 39625)
      • busybox (PID: 39635)
      • busybox (PID: 39630)
      • busybox (PID: 39640)
      • busybox (PID: 39650)
      • busybox (PID: 39655)
      • busybox (PID: 39645)
      • busybox (PID: 39660)
      • busybox (PID: 39675)
      • busybox (PID: 39665)
      • busybox (PID: 39670)
      • busybox (PID: 39690)
      • busybox (PID: 39685)
      • busybox (PID: 39680)
      • busybox (PID: 39604)
      • busybox (PID: 39695)
      • busybox (PID: 39700)
      • busybox (PID: 39710)
      • busybox (PID: 39705)
      • busybox (PID: 39715)
      • busybox (PID: 39720)
      • busybox (PID: 39725)
      • busybox (PID: 39730)
      • busybox (PID: 39735)
      • busybox (PID: 39740)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
354
Monitored processes
134
Malicious processes
3
Suspicious processes
28

Behavior graph

Click at the process to see the details
start dash no specs sudo no specs gnome-text-editor no specs locale-check no specs systemctl no specs systemctl no specs systemctl no specs python3.10 no specs gnome-terminal.real no specs gnome-terminal-server no specs bash no specs dash no specs dircolors no specs basename no specs dash no specs dirname no specs wget busybox tracker-extract-3 no specs chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs busybox chmod no specs bash no specs rm no specs

Process information

PID
CMD
Path
Indicators
Parent process
39494/bin/sh -c "DISPLAY=:0 sudo -iu user gnome-text-editor /tmp/message\.txt "/usr/bin/dashany-guest-agent
User:
user
Integrity Level:
UNKNOWN
39495sudo -iu user gnome-text-editor /tmp/message.txt/usr/bin/sudodash
User:
root
Integrity Level:
UNKNOWN
39496gnome-text-editor /tmp/message.txt/usr/bin/gnome-text-editorsudo
User:
user
Integrity Level:
UNKNOWN
39497/usr/bin/locale-check C.UTF-8/usr/bin/locale-checkgnome-text-editor
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
39523systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39545systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39546systemctl --user --global is-enabled snap.snapd-desktop-integration.snapd-desktop-integration.service/usr/bin/systemctlsnapd
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
39556/usr/bin/python3 /usr/bin/gnome-terminal/usr/bin/python3.10gnome-shell
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
39559/usr/bin/gnome-terminal.real/usr/bin/gnome-terminal.realpython3.10
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
39564/usr/libexec/gnome-terminal-server/usr/libexec/gnome-terminal-serversystemd
User:
user
Integrity Level:
UNKNOWN
Executable files
29
Suspicious files
18
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
39496gnome-text-editor/home/user/.local/share/org.gnome.TextEditor/recently-used.xbelxml
MD5:
SHA256:
39496gnome-text-editor/home/user/.cache/mesa_shader_cache/07/a5ca34ded861cac74dd87c9367c0531ebaf63dbinary
MD5:
SHA256:
39496gnome-text-editor/home/user/.cache/mesa_shader_cache/ab/bb62a84ebd8c6f699de6da1f95cf51d1deb40abinary
MD5:
SHA256:
39496gnome-text-editor/home/user/.cache/mesa_shader_cache/bd/c14f8413de78181f7ac91178544cc07db04f6cbinary
MD5:
SHA256:
39496gnome-text-editor/home/user/.cache/mesa_shader_cache/45/217da9944e1173de0da2cdff19ef5f11c65e2fbinary
MD5:
SHA256:
39496gnome-text-editor/home/user/.cache/mesa_shader_cache/d2/ea27fa2c8972e4719271e6ea166eb60cb88796binary
MD5:
SHA256:
39496gnome-text-editor/home/user/.cache/mesa_shader_cache/74/0feed80fcc6c9ed6fbc025c5e0aa962968fa40binary
MD5:
SHA256:
39496gnome-text-editor/home/user/.cache/mesa_shader_cache/ef/9264a26aff24effa3ab2448c5e2b0d43efb799binary
MD5:
SHA256:
39496gnome-text-editor/home/user/.cache/mesa_shader_cache/48/a0ff10489db7ebfc0d92f468cbc86c7b0efa5abinary
MD5:
SHA256:
39496gnome-text-editor/home/user/.cache/mesa_shader_cache/1e/249eaecfafcd47969e43f2f113e00fcb7dc5eebinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
32
TCP/UDP connections
38
DNS requests
12
Threats
96

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
185.125.190.97:80
http://connectivity-check.ubuntu.com/
GB
whitelisted
GET
204
185.125.190.97:80
http://connectivity-check.ubuntu.com/
GB
whitelisted
39592
wget
GET
200
31.170.22.205:80
http://31.170.22.205/bins/whisper.armv5
LV
executable
27.0 Kb
malicious
39604
busybox
GET
200
31.170.22.205:80
http://31.170.22.205/bins/whisper.armv6
LV
executable
27.0 Kb
malicious
39610
busybox
GET
200
31.170.22.205:80
http://31.170.22.205/bins/whisper.armv7
LV
executable
27.0 Kb
malicious
39625
busybox
GET
200
31.170.22.205:80
http://31.170.22.205/bins/whisper.arcle750d
LV
executable
27.0 Kb
malicious
39635
busybox
GET
200
31.170.22.205:80
http://31.170.22.205/bins/whisper.mips
LV
executable
27.0 Kb
malicious
39640
busybox
GET
200
31.170.22.205:80
http://31.170.22.205/bins/whisper.mips64
LV
executable
27.0 Kb
malicious
39650
busybox
GET
200
31.170.22.205:80
http://31.170.22.205/bins/whisper.mips64len32
LV
executable
27.0 Kb
malicious
39645
busybox
GET
200
31.170.22.205:80
http://31.170.22.205/bins/whisper.mips64le
LV
executable
27.0 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
484
avahi-daemon
224.0.0.251:5353
unknown
185.125.190.97:80
connectivity-check.ubuntu.com
Canonical Group Limited
GB
whitelisted
169.150.255.184:443
odrs.gnome.org
GB
whitelisted
512
snapd
185.125.188.54:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
512
snapd
185.125.188.55:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
512
snapd
185.125.188.59:443
api.snapcraft.io
Canonical Group Limited
GB
whitelisted
39592
wget
31.170.22.205:80
Sia Nano IT
LV
malicious
39593
busybox
31.170.22.205:80
Sia Nano IT
LV
malicious
39604
busybox
31.170.22.205:80
Sia Nano IT
LV
malicious
39610
busybox
31.170.22.205:80
Sia Nano IT
LV
malicious

DNS requests

Domain
IP
Reputation
connectivity-check.ubuntu.com
  • 185.125.190.97
  • 91.189.91.96
  • 185.125.190.18
  • 91.189.91.48
  • 185.125.190.17
  • 185.125.190.96
  • 91.189.91.98
  • 91.189.91.49
  • 185.125.190.98
  • 185.125.190.48
  • 185.125.190.49
  • 91.189.91.97
  • 2620:2d:4000:1::98
  • 2620:2d:4000:1::23
  • 2001:67c:1562::24
  • 2620:2d:4000:1::2a
  • 2620:2d:4000:1::96
  • 2620:2d:4000:1::2b
  • 2620:2d:4002:1::196
  • 2620:2d:4000:1::22
  • 2620:2d:4002:1::197
  • 2620:2d:4002:1::198
  • 2620:2d:4000:1::97
  • 2001:67c:1562::23
whitelisted
google.com
  • 142.250.184.238
  • 2a00:1450:4001:80b::200e
whitelisted
odrs.gnome.org
  • 169.150.255.184
  • 37.19.194.80
  • 195.181.170.18
  • 212.102.56.178
  • 169.150.255.180
  • 195.181.175.41
  • 207.211.211.27
  • 2a02:6ea0:c700::11
  • 2a02:6ea0:c700::19
  • 2a02:6ea0:c700::107
  • 2a02:6ea0:c700::112
  • 2a02:6ea0:c700::18
  • 2a02:6ea0:c700::21
  • 2a02:6ea0:c700::101
whitelisted
api.snapcraft.io
  • 185.125.188.54
  • 185.125.188.59
  • 185.125.188.58
  • 185.125.188.55
  • 2620:2d:4000:1010::117
  • 2620:2d:4000:1010::344
  • 2620:2d:4000:1010::42
  • 2620:2d:4000:1010::6d
whitelisted
12.100.168.192.in-addr.arpa
unknown

Threats

PID
Process
Class
Message
39592
wget
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
39604
busybox
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
39592
wget
Misc activity
ET INFO Packed Executable Download
39604
busybox
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
39592
wget
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
39604
busybox
Misc activity
ET INFO Packed Executable Download
39615
busybox
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
39620
busybox
Misc activity
ET INFO Packed Executable Download
39610
busybox
Misc activity
ET INFO Packed Executable Download
39615
busybox
Misc activity
ET INFO Packed Executable Download
No debug info