IP Address: 142.93.88.198Previously Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
142.93.88.198
Previously Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker, Scanner |
Services Targeted |
HadoopYARN |
Tags |
HTTP HadoopYARN Malicious File Scheduled Task Creation IDS - Web Application Attack Outgoing Connection Download and Execute Listening Download File Inbound HTTP Request |
Associated Attack Servers |
52.179.23.37 104.41.149.18 52.173.196.87 128.199.137.201 52.233.186.86 147.135.237.27 13.81.222.239 40.87.61.100 52.186.123.187 52.176.53.237 13.92.99.153 52.233.137.26 46.243.189.109 13.92.179.136 |
IP Address |
142.93.88.198 |
|
Domain |
- |
|
ISP |
Digital Ocean |
|
Country |
United States |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2018-09-09 |
Last seen in Guardicore Centra |
2018-09-17 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
Process /usr/bin/wget generated outgoing network traffic to: 46.243.189.109:80 |
Outgoing Connection |
/usr/local/apache2/cgi-bin/ws/v1/cluster/nexus.tar was downloaded |
Download File |
IDS detected Web Application Attack : 401TRG Generic Webshell Request - POST with wget in body |
IDS - Web Application Attack |
/usr/local/apache2/cgi-bin/ws/v1/cluster/nexus.tar was identified as malicious by YARA according to rules: Malw Xmrig Miner |
Malicious File |
The file /usr/local/apache2/cgi-bin/ws/v1/cluster/.../Nexus was downloaded and executed 10 times |
Download and Execute |
Process /usr/local/apache2/cgi-bin/ws/v1/cluster/.../Nexus started listening on ports: 35000 3 times |
Listening |
Process /usr/local/apache2/cgi-bin/ws/v1/cluster/.../Nexus generated outgoing network traffic to: 147.135.237.27:3333 |
Outgoing Connection |
Connection was closed due to user inactivity |
|
/usr/local/apache2/cgi-bin/ws/v1/cluster/.../run was identified as malicious by YARA according to rules: Malw Xmrig Miner |
Malicious File |
/usr/local/apache2/cgi-bin/ws/v1/cluster/.../Zeta was identified as malicious by YARA according to rules: Malw Pe Sections and 000 Common Rules |
Malicious File |
/usr/local/apache2/cgi-bin/ws/v1/cluster/.../NexusZeta.txt was identified as malicious by YARA according to rules: Suspicious Strings |
Malicious File |
/usr/local/apache2/cgi-bin/ws/v1/cluster/.../Nexus was identified as malicious by YARA according to rules: 000 Common Rules |
Malicious File |
/var/tmp/.z/Duck |
SHA256: 5da9c364062f8848d940fe98fc70800e1906f92788204551150e7097a0dffcf4 |
745544 bytes |
/usr/local/apache2/cgi-bin/ws/v1/cluster/nexus.tar |
SHA256: 4db0dd59202dbf8f8b6d702d7a3226da8a4e06f7fcd1c71cff456da13fb0a78a |
20989 bytes |
/usr/local/apache2/cgi-bin/ws/v1/cluster/nexus.tar |
SHA256: b1e313be87b5f67fc84e42aa305f829ccb48144628bbc7f3e71e1bcc6ee3cf12 |
198941 bytes |
/usr/local/apache2/cgi-bin/ws/v1/cluster/nexus.tar |
SHA256: 6055f173605c897843d332826fdfc78a42883665fc6fed922942eab4bc9b9ffd |
1484800 bytes |
/usr/local/apache2/cgi-bin/ws/v1/cluster/nexus.tar |
SHA256: 76dc285ae4b19b8f253f6e396cb69522d07b30daf3972220e135091a77127bf4 |
13021 bytes |
IP Address: 142.93.88.198Previously Malicious