IOC Report
SGNConnect_v5.0.20.deb

loading gifFilesProcessesDomains432Label

Files

File Path
Type
Category
Malicious
Download
SGNConnect_v5.0.20.deb
Debian binary package (format 2.0), with control.tar.xz, data compression xz
initial sample
/root/.cache/dconf/user
data
dropped
/tmp/dpkg-deb.7lBi6l/conffiles
ASCII text
dropped
/tmp/dpkg-deb.7lBi6l/control
ASCII text, with very long lines (477)
dropped
/tmp/dpkg-deb.7lBi6l/md5sums
ASCII text
dropped
/tmp/dpkg-deb.7lBi6l/postinst
POSIX shell script, ASCII text executable
dropped
/tmp/dpkg-deb.7lBi6l/prerm
POSIX shell script, ASCII text executable
dropped

Processes

Path
Cmdline
Malicious
/usr/bin/exo-open
exo-open /tmp/SGNConnect_v5.0.20.deb
/usr/bin/exo-open
-
/usr/bin/dbus-launch
dbus-launch --autolaunch=ee49dfd4fa47433baee88884e2d7de7c --binary-syntax --close-stderr
/usr/bin/exo-open
-
/usr/bin/exo-open
-
/bin/sh
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh engrampa /tmp/SGNConnect_v5.0.20.deb
/usr/bin/engrampa
engrampa /tmp/SGNConnect_v5.0.20.deb
/usr/bin/engrampa
-
/usr/bin/dbus-launch
dbus-launch --autolaunch=ee49dfd4fa47433baee88884e2d7de7c --binary-syntax --close-stderr
/usr/bin/engrampa
-
/usr/bin/dpkg-deb
dpkg-deb -I /tmp/SGNConnect_v5.0.20.deb
/usr/bin/dpkg-deb
-
/usr/bin/dpkg-deb
-
/usr/bin/dpkg-deb
-
/usr/bin/tar
tar -x -m -f - --warning=no-timestamp
/usr/bin/dpkg-deb
-
/usr/bin/rm
rm -rf -- /tmp/dpkg-deb.7lBi6l
/usr/bin/engrampa
-
/usr/bin/dpkg-deb
dpkg-deb -c /tmp/SGNConnect_v5.0.20.deb
/usr/bin/dpkg-deb
-
/usr/bin/dpkg-deb
-
/usr/bin/dpkg-deb
-
/usr/bin/tar
tar -tv -f - --warning=no-timestamp
There are 13 hidden processes, click here to show them.

Domains

Name
IP
Malicious
daisy.ubuntu.com
162.213.35.24