IP Address: 188.214.208.108Previously Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
188.214.208.108
Previously Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker, Scanner |
Services Targeted |
SSH |
Tags |
Successful SSH Login Human Download and Allow Execution Download and Execute Package Install Service Deletion Malicious File Outgoing Connection Access Suspicious Domain Service Creation Bulk Files Tampering DNS Query Service Configuration 49 Shell Commands Networking Operation SSH Download Operation HTTP Download File |
Associated Attack Servers |
www.speedtest.net archive.ubuntu.com celito.net suddenlink.net centurylink.net speedtest31.suddenlink.net rockymount.speedtest.centurylink.net nasapaul.com blazingfast.io rdu.speedtest.sbcglobal.net rdu.ookla.gfsvc.com speed.celito.net sbcglobal.net 185.61.137.36 72.21.92.82 99.24.18.89 188.166.0.2 188.166.0.5 188.166.0.3 188.166.0.4 188.166.0.6 205.171.135.26 74.113.230.246 136.42.34.75 136.42.34.74 188.166.0.1 208.180.158.146 |
IP Address |
188.214.208.108 |
|
Domain |
- |
|
ISP |
Digital Cable Systems S.A. |
|
Country |
Romania |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2018-04-01 |
Last seen in Guardicore Centra |
2018-04-03 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List |
Successful SSH Login |
Process /usr/bin/wget attempted to access suspicious domains: nasapaul.com 7 times |
Access Suspicious Domain Outgoing Connection DNS Query |
Process /usr/bin/wget generated outgoing network traffic to: 185.61.137.36:80 3 times |
Outgoing Connection |
/root/v.py was downloaded |
Download File |
Process /usr/bin/python2.7 generated outgoing network traffic to: 205.171.135.26:80, 208.180.158.146:80, 74.113.230.246:80, 136.42.34.75:80, 72.21.92.82:80, 99.24.18.89:80 and 136.42.34.74:80 |
Outgoing Connection |
Process /usr/bin/python2.7 attempted to access domains: rockymount.speedtest.centurylink.net, www.speedtest.net, speedtest31.suddenlink.net and rdu.speedtest.sbcglobal.net |
DNS Query |
Process /usr/bin/python2.7 attempted to access suspicious domains: rdu.ookla.gfsvc.com, celito.net and speed.celito.net |
Access Suspicious Domain Outgoing Connection DNS Query |
/root/ninfo was downloaded |
Download File |
/root/Nasa.zip was downloaded |
Download File |
The file /root/Nasa/1 was downloaded and granted execution privileges |
Download and Allow Execution |
The file /root/Nasa/n was downloaded and granted execution privileges |
Download and Allow Execution |
The file /root/Nasa/nhdd was downloaded and granted execution privileges |
Download and Allow Execution |
The file /root/Nasa/port was downloaded and granted execution privileges |
Download and Allow Execution |
The file /root/Nasa/screen was downloaded and granted execution privileges |
Download and Allow Execution |
Process /root/Nasa/pscan2 generated outgoing network traffic to: 188.166.0.5:22, 188.166.0.4:22, 188.166.0.2:22, 188.166.0.6:22, 188.166.0.3:22 and 188.166.0.1:22 |
Outgoing Connection |
The file /root/Nasa/pscan2 was downloaded and executed |
Download and Execute |
/root/paul was downloaded |
Download File |
Process /usr/lib/apt/methods/http attempted to access domains: _http._tcp.archive.ubuntu.com and archive.ubuntu.com |
DNS Query |
The file /etc/init.d/screen-cleanup was downloaded and granted execution privileges |
Download and Allow Execution |
The file /usr/share/screen was downloaded and granted execution privileges |
Download and Allow Execution |
The file /usr/share/screen/utf8encodings was downloaded and granted execution privileges |
Download and Allow Execution |
The file /usr/share/doc/screen was downloaded and granted execution privileges |
Download and Allow Execution |
The file /usr/share/doc/screen/examples was downloaded and granted execution privileges |
Download and Allow Execution |
The file /usr/share/doc/screen/terminfo was downloaded and granted execution privileges |
Download and Allow Execution |
Service screen-cleanup.dpkg-new was created |
Service Creation |
Service S02screen-cleanup was created |
Service Creation |
Service screen-cleanup was created |
Service Creation |
The file /usr/bin/screen was downloaded and executed 6 times |
Download and Execute |
Connection was closed due to timeout |
|
/root/Nasa/nhdd was identified as malicious by YARA according to rules: Malw Miscelanea Linux, Maldoc Somerules and Crypto Signatures |
Malicious File |
Process /usr/bin/dpkg performed bulk changes in {/} on 137 files |
Bulk Files Tampering |
/v.py |
SHA256: 00e430b733cf199747c9c6e0f2e2fae6a045bbed9c0f0f993112b301fcdf5dbc |
25470 bytes |
/var/tmp/.x/Nasa/nhdd |
SHA256: 43333adf6ba7d876d5574543278616dad40376b1024a01d0f48c04b0ca5f7534 |
1485768 bytes |
/var/tmp/ninfo |
SHA256: f7705ce1f52afc75024ec31dbe11ed7d5627d38bf497a81a4946f0ceea837453 |
4142 bytes |
IP Address: 188.214.208.108Previously Malicious