IP Address: 193.15.16.4Previously Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
193.15.16.4
Previously Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker, Scanner |
Services Targeted |
SSH |
Tags |
SSH Malicious File SFTP Download and Execute Outgoing Connection Successful SSH Login Port 22 Scan 2 Shell Commands DNS Query |
Associated Attack Servers |
qcuifb2klqqkwc5q.onion.to zhtwwpqt6ci62n5o.onion.to xphkxaiz233pjoto.onion.link zlha65umg7qmprg6.onion.cab gmpsfqrlquaokfl5.onion.link 6xfyifncujedhhvn.onion.nu startdedicated.de lmco62zvt7fnezd5.onion.to 5ss5uibr5nmok3yp.onion.to igxhhnue75hvk5yc.onion.to gmpsfqrlquaokfl5.onion.to lmco62zvt7fnezd5.onion.link hukot.net tqz3y4w3eq4wi2ay.onion.nu 188.213.49.65 62.138.11.6 46.36.37.82 192.36.27.5 103.198.0.2 185.100.85.150 |
IP Address |
193.15.16.4 |
|
Domain |
- |
|
ISP |
Tele2 SWIPnet |
|
Country |
Sweden |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2017-04-25 |
Last seen in Guardicore Centra |
2018-08-05 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List |
Successful SSH Login |
The file /tmp/bVrSlADyZ4o was downloaded and executed 2 times |
Download and Execute |
Process /tmp/bVrSlADyZ4o generated outgoing network traffic to: 198.77.150.55:22, 41.37.32.49:22, 111.232.86.229:22, 139.121.94.116:22, 124.111.133.190:22, 184.138.43.56:22, 120.246.27.71:22, 151.29.43.42:22, 66.88.227.91:22, 50.140.113.39:22, 2.98.186.49:22, 116.41.191.255:22, 31.226.128.200:22, 204.21.183.201:22, 203.72.225.237:22, 84.182.9.172:22, 109.204.38.67:22, 187.109.83.197:22, 146.117.35.229:22, 122.61.173.75:22, 152.186.109.88:22, 68.67.1.107:22, 126.155.75.159:22, 124.35.138.152:22, 209.133.3.4:22, 210.223.227.227:22, 25.77.13.245:22, 222.69.234.244:22, 191.149.129.248:22, 141.11.51.105:22, 135.51.191.253:22, 90.247.227.3:22, 190.19.39.79:22, 86.85.194.221:22, 199.20.142.188:22, 128.244.255.116:22, 161.211.145.56:22, 165.107.151.109:22, 216.168.180.161:22, 102.80.147.214:22, 181.210.17.114:22, 120.137.188.221:22, 195.178.69.63:22, 57.212.212.191:22, 142.126.71.160:22, 37.76.33.157:22, 35.165.123.18:22, 83.229.5.45:22, 194.88.142.8:22, 210.122.129.61:22, 184.139.129.225:22, 32.222.64.69:22, 184.219.203.170:22, 142.237.218.1:22, 68.156.193.147:22, 171.166.16.204:22, 61.62.161.67:22, 103.198.0.2:80, 116.178.252.65:22, 187.212.54.118:22, 119.87.124.52:22, 88.110.76.215:22, 92.97.12.201:22, 39.138.174.253:22, 203.26.175.160:22, 128.199.194.248:22, 173.47.28.92:22, 193.138.210.133:22, 212.245.70.35:22, 115.142.164.87:22, 62.205.182.212:22, 158.191.124.26:22, 99.49.253.59:22, 103.165.159.221:22, 179.151.165.171:22, 157.63.124.157:22, 118.23.37.202:22, 24.132.127.74:22, 51.6.243.118:22, 171.212.145.251:22, 200.179.12.200:22, 52.168.166.181:22, 199.17.38.30:22, 71.19.17.52:22, 24.35.130.114:22, 71.248.142.230:22, 31.252.212.91:22, 36.104.72.41:22, 71.221.50.229:22, 52.67.54.246:22, 4.108.174.107:22, 189.145.128.224:22, 63.103.36.4:22, 187.58.18.183:22, 105.248.224.74:22, 126.240.7.66:22, 14.111.208.7:22, 47.240.105.26:22, 142.202.30.190:22 and 48.74.105.196:22 |
Outgoing Connection |
Process /tmp/bVrSlADyZ4o scanned port 22 on 99 IP Addresses |
Port 22 Scan |
/tmp/bVrSlADyZ4o was identified as malicious by YARA according to rules: Apt Apt1 and Crypto Signatures |
Malicious File |
/tmp/bVrSlADyZ4o |
SHA256: fb229ec335f33284fc90dbf8407d399d41fe112d0577cf64cc9beac32da7dcda |
4390176 bytes |
/tmp/eBWWDqnvbdDLkrf |
SHA256: 50d60a26c70b45c368acbc11050bbd1a045a782be90fe849243fa5051182a321 |
4390176 bytes |
/tmp/kCpppADPqDKxu |
SHA256: 98c27ea6ce8602916aa24ae3ecf91af2e8140a986eb38d39a0251c8f2d4b0941 |
4390176 bytes |
/tmp/DFxVFwauOgIk |
SHA256: 118bcc73f2b740392af9729382f348b5d85f497424f1523c3d14b1cc57d75985 |
4390176 bytes |
/tmp/OipGuY5ZHQ |
SHA256: 96100ae4c14b93ef405bc304a74f9f2b0a4128322382742b960fadfc4e5e4dd3 |
4390176 bytes |
/tmp/wTDo8tMptjJDlh |
SHA256: 957bf53bc91efd4bc60c775acf5e0377f1f5ff819d818747d084f0832a140f40 |
4390176 bytes |
/tmp/sCojBBMFtx |
SHA256: 1040477d7f0879e8b8d240c1f1ee3a2c8269a6c7c376993cb1e864d0b66eab08 |
4390176 bytes |
/tmp/udAOHuaZAs0 |
SHA256: 7955da4d368434a2c5d2ae5b2ba86c8e546bf791f0fbb08891b4c776cf8a2253 |
4390176 bytes |
/tmp/PPE7btu7fOrN |
SHA256: 7d915f35c60fbe29055582c29b442dae9f8b99fdc0c5b8c1d629823e43dba66b |
4390176 bytes |
/tmp/GMYrkWSULWG |
SHA256: 6036ae624ce91e268f88ab975f45551985120376176812a68d4b996e30505782 |
4633216 bytes |
IP Address: 193.15.16.4Previously Malicious