IP Address: 104.248.64.40Previously Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
104.248.64.40
Previously Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker, Scanner |
Services Targeted |
HadoopYARN |
Tags |
HTTP HadoopYARN Malicious File IDS - Web Application Attack Outgoing Connection Download and Allow Execution Download and Execute Download File Inbound HTTP Request |
Associated Attack Servers |
104.40.157.159 40.71.178.15 52.168.36.55 13.92.131.99 52.232.126.80 52.168.38.28 13.73.160.230 52.186.120.217 52.232.109.105 40.71.224.222 40.68.167.82 40.71.229.210 40.68.97.216 13.82.110.239 52.168.89.149 13.82.51.31 52.168.135.53 52.233.177.165 207.154.249.73 13.92.132.27 104.248.31.143 13.93.0.140 52.166.63.111 23.101.128.211 52.233.141.180 52.174.52.111 137.116.197.85 |
IP Address |
104.248.64.40 |
|
Domain |
- |
|
ISP |
Digital Ocean |
|
Country |
United States |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2018-10-07 |
Last seen in Guardicore Centra |
2018-10-15 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
Process /usr/bin/wget generated outgoing network traffic to: 104.248.31.143:80 |
Outgoing Connection |
The file /tmp/mysql.sock.lock was downloaded and granted execution privileges |
|
The file /tmp/bash was downloaded and executed |
Download and Execute |
IDS detected Web Application Attack : 401TRG Generic Webshell Request - POST with wget in body |
IDS - Web Application Attack |
Connection was closed due to user inactivity |
|
/tmp/bash was identified as malicious by YARA according to rules: Malw Linuxhelios and 000 Common Rules |
Malicious File |
/tmp/bash |
SHA256: 70b2859069ffcc43d0fac919648b04e697f9baf330c318a57830255ce40f5bb9 |
28943 bytes |
/tmp/bash |
SHA256: 6c02970cd7ca64ecc1adf2fea2eb74119c94c71deaac04caff112f910af301a5 |
104020 bytes |
/tmp/bash |
SHA256: 8c58ae8bde18dfbd75731e9e5693bc430c626e5f4ded3faeec800d3a7115df29 |
56831 bytes |
/tmp/bash |
SHA256: 1e7877fb8ba67e4a1654d63a2fa91defb69cc5bd06ee710bdfe6a78a9943fdde |
38239 bytes |
/tmp/bash.1 |
SHA256: 149d292ce8d7eb8f78bb23e3fc9606fc896a4c33b9b7cbb2b3dadf83e26bc3be |
137464 bytes |
/tmp/bash |
SHA256: 99377b2735d5714b27d4ac8c84034aeb214497ad3ce9f25083882498112d3f1c |
55503 bytes |
/tmp/bash.1 |
SHA256: c99767929a7a6129c2a986b67c47649dda8e5d78e5016e296fbc5a22a806b6e9 |
27615 bytes |
IP Address: 104.248.64.40Previously Malicious