Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 147.182.184.44Malicious

IP Address: 147.182.184.44Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Connect-Back, Scanner

Services Targeted

SCP SSH

Tags

11 Shell Commands Port 1234 Scan System File Modification SSH Listening SCP Port 80 Scan Port 8080 Scan Superuser Operation Outgoing Connection Successful SSH Login Download and Execute Download File

Associated Attack Servers

amazonaws.com btcentralplus.com buzzee.fr dns.google gvt.net.br herza.id icpnet.pl internetia.net.pl ip-54-38-175.eu jaguar-network.net k12.wv.us kcell.kz mware.cz ono.com openmobile.ne.jp panda-world.ne.jp poneytelecom.eu prioritytelecom.net spcsdns.net srasia-great.com swisscom.ch tesene.it vultrusercontent.com xmrpool.eu ziggozakelijk.nl

1.1.1.1 1.15.102.11 2.75.197.83 3.99.130.70 5.245.49.15 7.147.227.241 7.195.8.220 8.8.4.4 8.8.8.8 12.228.224.139 13.86.65.237 13.140.94.114 19.119.25.231 20.58.184.140 21.192.49.221 22.102.144.220 23.250.84.116 25.219.95.43 26.211.116.12 27.129.128.235 30.237.242.154 31.244.78.253 34.195.158.59 35.170.191.119 36.29.130.24 36.82.99.139 37.135.22.223 37.163.250.142 37.246.211.55 38.75.229.170

Basic Information

IP Address

147.182.184.44

Domain

-

ISP

Black & Veatch International Company

Country

United States

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2022-04-13

Last seen in Akamai Guardicore Segmentation

2023-05-24

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / ****** - Authentication policy: White List

Successful SSH Login

Process /bin/bash scanned port 1234 on 26 IP Addresses

Port 1234 Scan

Process /tmp/apache2 scanned port 1234 on 26 IP Addresses

Port 8080 Scan Port 1234 Scan Port 80 Scan

Process /tmp/apache2 scanned port 80 on 26 IP Addresses

Port 8080 Scan Port 1234 Scan Port 80 Scan

Process /tmp/apache2 scanned port 8080 on 26 IP Addresses

Port 8080 Scan Port 1234 Scan Port 80 Scan

Process /tmp/apache2 scanned port 1234 on 32 IP Addresses

Port 8080 Scan Port 1234 Scan Port 80 Scan

Process /tmp/apache2 scanned port 1234 on 29 IP Addresses

Port 8080 Scan Port 1234 Scan Port 80 Scan

Process /usr/sbin/sshd scanned port 1234 on 26 IP Addresses

Port 1234 Scan

A user logged in using SSH with the following credentials: root / ****** - Authentication policy: Correct Password 6 times

Successful SSH Login

/dev/shm/ifconfig was downloaded

Download File

A possibly malicious Superuser Operation was detected 2 times

Superuser Operation

The file /tmp/ifconfig was downloaded and executed 5 times

Download and Execute

The file /tmp/apache2 was downloaded and executed 120 times

Download and Execute

Process /tmp/apache2 generated outgoing network traffic to: 1.1.1.1:443, 1.113.91.118:80, 1.113.91.118:8080, 103.81.50.18:80, 103.81.50.18:8080, 103.90.177.102:1234, 111.53.11.130:1234, 115.10.43.173:80, 115.10.43.173:8080, 117.16.44.111:1234, 117.232.32.101:80, 117.232.32.101:8080, 117.54.14.169:1234, 118.218.209.149:1234, 12.30.190.174:80, 12.30.190.174:8080, 120.166.240.217:80, 120.166.240.217:8080, 123.132.238.210:1234, 136.52.69.72:80, 136.52.69.72:8080, 139.131.17.110:80, 139.131.17.110:8080, 143.20.206.192:80, 143.20.206.192:8080, 147.182.233.56:1234, 150.107.95.20:1234, 157.38.16.156:80, 157.38.16.156:8080, 161.208.228.139:80, 161.208.228.139:8080, 172.67.133.228:443, 184.38.173.175:80, 184.38.173.175:8080, 186.229.199.68:80, 186.229.199.68:8080, 190.60.239.44:1234, 193.40.196.147:80, 20.141.185.205:1234, 203.164.75.123:80, 203.164.75.123:8080, 205.52.248.132:80, 205.52.248.132:8080, 209.225.31.64:80, 209.225.31.64:8080, 216.123.73.106:80, 216.123.73.106:8080, 216.23.244.66:80, 216.23.244.66:8080, 222.100.124.62:1234, 222.134.240.92:1234, 222.76.233.216:80, 222.76.233.216:8080, 223.171.91.191:1234, 243.32.140.92:80, 243.32.140.92:8080, 247.66.145.130:80, 247.66.145.130:8080, 252.252.179.21:80, 252.252.179.21:8080, 29.212.208.39:80, 29.212.208.39:8080, 35.40.20.133:80, 39.175.68.100:1234, 43.242.247.139:1234, 45.120.216.114:1234, 45.142.146.6:80, 45.142.146.6:8080, 46.13.164.29:1234, 46.70.191.85:80, 46.70.191.85:8080, 47.19.58.68:80, 47.19.58.68:8080, 51.75.146.174:443, 52.131.32.110:1234, 56.216.110.181:80, 61.84.162.66:1234, 66.2.193.172:80, 66.2.193.172:8080, 7.140.140.107:80, 7.140.140.107:8080, 80.147.162.151:1234, 85.105.82.39:1234, 86.133.233.66:1234, 89.212.123.191:1234, 94.153.165.43:1234, 98.38.146.162:80 and 98.38.146.162:8080

Outgoing Connection

Process /tmp/apache2 started listening on ports: 1234, 8083 and 8180

Listening

Process /tmp/apache2 scanned port 80 on 32 IP Addresses

Port 8080 Scan Port 1234 Scan Port 80 Scan

Process /tmp/apache2 scanned port 8080 on 32 IP Addresses

Port 8080 Scan Port 1234 Scan Port 80 Scan

Process /tmp/apache2 scanned port 80 on 29 IP Addresses

Port 8080 Scan Port 1234 Scan Port 80 Scan

Process /tmp/apache2 scanned port 8080 on 29 IP Addresses

Port 8080 Scan Port 1234 Scan Port 80 Scan

./ifconfig was downloaded

Download File

/var/tmp/ifconfig was downloaded

Download File

The file /usr/bin/uptime was downloaded and executed

Download and Execute

/root/ifconfig was downloaded

Download File

System file /etc/ifconfig was modified 16 times

System File Modification

/etc/ifconfig was downloaded

Download File

Process /usr/local/mysql/bin/mysqld started listening on ports: 3306

Listening

Connection was closed due to timeout

Associated Files

/var/tmp/ifconfig

SHA256: 2aacc3f6c14a2bd120ce9f7cab7af1f4d3e207bea33d56f02a14f75613a7930c

786432 bytes

/var/tmp/ifconfig

SHA256: 331f1ead3df8fed58ccf68da781f34b2f228a5c37f3bb245b836a4b49b1cf269

557056 bytes

/var/tmp/ifconfig

SHA256: 376f8f665f43984bf5aa16524421600b638fc1a7b331e8ac78b60a387fcf8dbb

2621440 bytes

/var/tmp/ifconfig

SHA256: 550307921085269ac7b53b3492fbffd8dc7bb9deaee1b26d433b3ebb40282384

2195456 bytes

/var/tmp/ifconfig

SHA256: 63ce5e408bc30df5efb4e48cb2e893e84b58da0ea31d834ce11db915f0dfaba2

32768 bytes

/var/tmp/ifconfig

SHA256: 861921d16b4f8870dda3d79aecaa828b713b8e41b29ec977aca10c236356144e

1507328 bytes

/var/tmp/ifconfig

SHA256: 93b5387c1ad89b1bba7a1c7ad722d5406dd174e58cd0a1de5a0684e02a83fd33

1474560 bytes

/root/ifconfig

SHA256: 9f26c9e5240ac92baa25aadfd4f23dcb35723982204e00da5cbfb5cb88bf56af

1867776 bytes