Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 185.149.21.133Previously Malicious

IP Address: 185.149.21.133Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Scanner

Services Targeted

SSH

Tags

Successful SSH Login HTTP Download Operation Download and Execute SSH Brute Force Log Tampering Download File Access Suspicious Domain Outgoing Connection DNS Query Executable File Modification 1 Shell Commands Download and Allow Execution SSH Bulk Files Tampering

Associated Attack Servers

54.39.248.217 91.189.91.38 91.189.91.39 172.245.157.100 185.125.190.36 185.125.190.39 198.50.242.159 218.3.91.170 218.3.230.130 218.32.108.22

Basic Information

IP Address

185.149.21.133

Domain

-

ISP

DediPath, LLC

Country

United States

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2022-04-25

Last seen in Akamai Guardicore Segmentation

2022-04-28

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List (Part of a Brute Force Attempt)

SSH Brute Force Successful SSH Login

A possibly malicious Download Operation was detected 2 times

Download Operation

Process /usr/bin/wget generated outgoing network traffic to: 54.39.248.217:80

Outgoing Connection

Process /usr/bin/wget attempted to access suspicious domains: ip-54-39-248.net

Access Suspicious Domain Outgoing Connection

/tmp/sshd was downloaded

Download File

Process /bin/bash generated outgoing network traffic to: 54.39.248.217:80 2 times

Outgoing Connection

Process /bin/bash attempted to access suspicious domains: ip-54-39-248.net 2 times

Access Suspicious Domain Outgoing Connection

/tmp/mizakotropista86 was downloaded

Download File

The file /tmp/zekinha was downloaded and executed 11 times

Download and Execute

Process /usr/bin/wget generated outgoing network traffic to: 54.39.248.217:80

Outgoing Connection

Process /usr/bin/wget attempted to access suspicious domains: ip-54-39-248.net

Access Suspicious Domain Outgoing Connection

The file /tmp/mizakotropistaps was downloaded and granted execution privileges

Process /bin/bash generated outgoing network traffic to: 54.39.248.217:80

Outgoing Connection

Process /bin/bash attempted to access suspicious domains: ip-54-39-248.net

Access Suspicious Domain Outgoing Connection

/tmp/mizakotropistasl was downloaded

Download File

Process /usr/bin/wget generated outgoing network traffic to: 54.39.248.217:80 2 times

Outgoing Connection

Process /usr/bin/wget attempted to access suspicious domains: ip-54-39-248.net 2 times

Access Suspicious Domain Outgoing Connection

/tmp/mizakotropistam4 was downloaded

Download File

Process /bin/bash generated outgoing network traffic to: 54.39.248.217:80 2 times

Outgoing Connection

Process /bin/bash attempted to access suspicious domains: ip-54-39-248.net 2 times

Access Suspicious Domain Outgoing Connection

/tmp/mizakotropistam5 was downloaded

Download File

/tmp/mizakotropistam6 was downloaded

Download File

Process /usr/bin/wget generated outgoing network traffic to: 54.39.248.217:80

Outgoing Connection

Process /usr/bin/wget attempted to access suspicious domains: ip-54-39-248.net

Access Suspicious Domain Outgoing Connection

/tmp/mizakotropistam7 was downloaded

Download File

The file /tmp/mizakotropistapc was downloaded and granted execution privileges

The file /tmp/mizakotropista8k was downloaded and granted execution privileges

Process /usr/bin/wget generated outgoing network traffic to: 54.39.248.217:80

Outgoing Connection

Process /usr/bin/wget attempted to access suspicious domains: ip-54-39-248.net 2 times

Access Suspicious Domain Outgoing Connection

The file /tmp/mizakotropistah4 was downloaded and granted execution privileges

Process /bin/bash generated outgoing network traffic to: 54.39.248.217:80

Outgoing Connection

Process /bin/bash attempted to access suspicious domains: ip-54-39-248.net

Access Suspicious Domain Outgoing Connection

The file /tmp/mizakotropistax64 was downloaded and granted execution privileges

Download and Allow Execution

Process /bin/bash generated outgoing network traffic to: 54.39.248.217:80

Outgoing Connection

Process /bin/bash attempted to access suspicious domains: ip-54-39-248.net

Access Suspicious Domain Outgoing Connection

The file /tmp/bash was downloaded and executed

Download and Execute

The file /tmp/bash was downloaded and executed 2 times

Download and Execute

Process /tmp/bash generated outgoing network traffic to: 172.245.157.100:443

Outgoing Connection

Process /bin/bash generated outgoing network traffic to: 54.39.248.217:80

Outgoing Connection

Process /bin/bash attempted to access suspicious domains: ip-54-39-248.net

Access Suspicious Domain Outgoing Connection

Process /usr/bin/wget generated outgoing network traffic to: 54.39.248.217:80

Outgoing Connection

The file /tmp/x86 was downloaded and granted execution privileges

Download and Allow Execution

Process /usr/bin/wget generated outgoing network traffic to: 54.39.248.217:80

Outgoing Connection

Process /usr/bin/wget attempted to access suspicious domains: ip-54-39-248.net

Access Suspicious Domain Outgoing Connection

The file /tmp/ulimit.sh was downloaded and granted execution privileges

Process /usr/bin/apt-get attempted to access domains: _http._tcp.archive.ubuntu.com and archive.ubuntu.com

DNS Query

Process /usr/bin/apt-get generated outgoing network traffic to: 91.189.91.38:80

Outgoing Connection

The file /usr/share/doc/libtcl8.6.dpkg-new was downloaded and granted execution privileges

Download and Allow Execution

The file /usr/share/tcltk was downloaded and granted execution privileges

The file /usr/share/tcltk/tcl8.6 was downloaded and granted execution privileges

The file /usr/share/tcltk/tcl8.6/tcl8 was downloaded and granted execution privileges

The file /usr/share/tcltk/tcl8.6/tcl8/platform was downloaded and granted execution privileges

Download and Allow Execution

The file /usr/share/tcltk/tcl8.6/http1.0 was downloaded and granted execution privileges

The file /usr/share/tcltk/tcl8.6/msgs was downloaded and granted execution privileges

Download and Allow Execution

The file /usr/share/tcltk/tcl8.6/encoding was downloaded and granted execution privileges

The file /usr/share/tcltk/tcl8.6/opt0.4.dpkg-new was downloaded and granted execution privileges

Download and Allow Execution

Executable file /usr/sbin/hping3.dpkg-new was modified 16 times

Executable File Modification

The file /usr/sbin/hping3.dpkg-new was downloaded and granted execution privileges

The file /usr/share/doc/hping3.dpkg-new was downloaded and granted execution privileges

The file /usr/share/doc/hping3/examples.dpkg-new was downloaded and granted execution privileges

History File Tampering detected from /bin/rm on the following logs: /root/.bash_history

Log Tampering

Connection was closed due to timeout

Process /usr/bin/dpkg performed bulk changes in {/usr/share} on 286 files

Bulk Files Tampering

Associated Files

/tmp/mizakotropistaps

SHA256: 0619b86b6707c97febaae11d75f783ec4b32e88f83f5d55761a0d04f92bea42e

46792 bytes

/tmp/mizakotropistasl

SHA256: 0e722a9c17bebf1a84754e4cef108a38cde9763749596d5a4672697ab68eaf67

47784 bytes

/tmp/mizakotropistam5

SHA256: 110ddecda3ce0bd41206fe557550754b4fb21bcd663201253d57f9c291764440

32716 bytes

/tmp/mizakotropista8k

SHA256: 3c128d01635bf9a9b5d3d90ef4a56212554f7a44c579a74aff707455847eb515

34952 bytes

/tmp/mizakotropistam6

SHA256: 447e208fa47057567e828912b23a0927b0c74220e7336e2243ff1541b353157e

50304 bytes

/tmp/x86

SHA256: 505902448c3c57d0f0b0df3a55ef380a580739f5bde1bb5d3a8556128bf62023

18480 bytes

/tmp/zekinha

SHA256: 50fa1f2735f018b22c86fc6ce546a8c6b9ca730e78d23f5a986f787191398c37

33564 bytes

/tmp/mizakotropistam4

SHA256: 5b1ca59a8e0e9583c4102605264fc29a0cfab84c68b78072a908a5783b441948

37872 bytes

/tmp/mizakotropistax64

SHA256: 5d6f674a7abab5e60548531a69e6ecb23cc2e2fe823cd7f8ccac6928db5f757e

37888 bytes

/tmp/bash

SHA256: 61f02a95f14cba234abf1f440994f98cf144ec99164666131dfdfb1c22b0ab95

107306 bytes

/tmp/ulimit.sh

SHA256: 863a1faededb63382596ff4564a03b1d56feac95e05fa87fb87ea6622c17381e

908 bytes

/usr/sbin/hping3.dpkg-new

SHA256: 9921ddd7a0cb721926ad6aa95adb0f34b1a3e6e901554cde9408f5c3f5fe0dc9

165128 bytes

/tmp/sshd

SHA256: e177a69cd9b95e54bc74eccb146464679df0f366616d010268e6398115ce0f0f

5741 bytes

/tmp/mizakotropistah4

SHA256: e74c13cec8a05ecdda399307c4c5a1272340242ac876fe5d9287b66cc5f586b4

32704 bytes

/tmp/mizakotropistah4

SHA256: e74cad2606804cd77688fc51c0b4a41126b8554b7fd50ace8bfc8e8f2f3cf15f

13217 bytes

/tmp/mizakotropistam7

SHA256: f89bb5668bb6b8c46e837e8219e07303b94305bae6faa298ea21feea2b02cd3d

108079 bytes