Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 195.82.131.164Previously Malicious

IP Address: 195.82.131.164Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Scanner

Services Targeted

SSH

Tags

Access Suspicious Domain SSH Package Install Log Tampering Download and Allow Execution Bulk Files Tampering Download File Successful SSH Login Download Operation Scheduled Task Creation Download and Execute DNS Query SFTP 26 Shell Commands Human Superuser Operation

Associated Attack Servers

MustyHay.eu.ix.Undernet.org pipera.ro.eu.undernet.org sad.kire.net

Basic Information

IP Address

195.82.131.164

Domain

-

ISP

SIVECO Romania SA

Country

Romania

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2020-05-22

Last seen in Akamai Guardicore Segmentation

2020-05-22

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / ******** - Authentication policy: White List

Successful SSH Login

History File Tampering detected from /bin/bash 4 times

Log Tampering

A possibly malicious Download Operation was detected 2 times

Download Operation Package Install Superuser Operation

Process /usr/bin/wget attempted to access suspicious domains: sad.kire.net

DNS Query Access Suspicious Domain

A user logged in using SSH with the following credentials: root / ******** - Authentication policy: Correct Password

Successful SSH Login

/root/thebot2.tgz.filepart was downloaded

Download File

The file /tmp/_MEIKAWFjK/datetime.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/_codecs_tw.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/cPickle.so was downloaded and granted execution privileges

Download and Allow Execution

The file /root/statistics/h64 was downloaded and executed

Download and Execute

The file /root/statistics/run64 was downloaded and executed 6 times

Download and Execute

The file /tmp/_MEIKAWFjK/unicodedata.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/_codecs_iso2022.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/_codecs_hk.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/bz2.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/_codecs_cn.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/termios.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/_codecs_kr.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/pyexpat.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/_weakref.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/audioop.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/_multibytecodec.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/_codecs_jp.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/readline.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/time.so was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libbz2.so.1 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libkeyutils.so.1 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libk5crypto.so.3 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libcrypto.so.10 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libgssapi_krb5.so.2 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libssl.so.10 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libkrb5support.so.0 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libcom_err.so.2 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libkrb5.so.3 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libselinux.so.1 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libz.so.1 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libexpat.so.1 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libtinfo.so.5 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libreadline.so.6 was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/_MEIKAWFjK/libpython2.6.so.1.0 was downloaded and loaded by /root/statistics/run64 2 times

Download and Execute

The file /tmp/_MEIKAWFjK/_struct.so was downloaded and loaded by /root/statistics/run64

Download and Execute

The file /tmp/_MEIKAWFjK/zlib.so was downloaded and loaded by /root/statistics/run64 2 times

Download and Execute

The file /tmp/_MEIKAWFjK/math.so was downloaded and loaded by /root/statistics/run64 2 times

Download and Execute

The file /tmp/_MEIKAWFjK/binascii.so was downloaded and loaded by /root/statistics/run64

Download and Execute

The file /tmp/_MEIKAWFjK/_random.so was downloaded and loaded by /root/statistics/run64 4 times

Download and Execute

The file /tmp/_MEIKAWFjK/strop.so was downloaded and loaded by /root/statistics/run64

Download and Execute

The file /tmp/_MEIKAWFjK/fcntl.so was downloaded and loaded by /root/statistics/run64 2 times

Download and Execute

The file /tmp/_MEIKAWFjK/array.so was downloaded and loaded by /root/statistics/run64

Download and Execute

The file /tmp/_MEIKAWFjK/_socket.so was downloaded and loaded by /root/statistics/run64

Download and Execute

The file /tmp/_MEIKAWFjK/_ssl.so was downloaded and loaded by /root/statistics/run64 2 times

Download and Execute

The file /tmp/_MEIKAWFjK/cStringIO.so was downloaded and loaded by /root/statistics/run64

Download and Execute

The file /tmp/_MEIKAWFjK/operator.so was downloaded and loaded by /root/statistics/run64

Download and Execute

The file /tmp/_MEIKAWFjK/_collections.so was downloaded and loaded by /root/statistics/run64 2 times

Download and Execute

The file /tmp/_MEIKAWFjK/select.so was downloaded and loaded by /root/statistics/run64

Download and Execute

The file /tmp/_MEIKAWFjK/itertools.so was downloaded and loaded by /root/statistics/run64

Download and Execute

The file /tmp/_MEIKAWFjK/_functools.so was downloaded and loaded by /root/statistics/run64 2 times

Download and Execute

The file /tmp/_MEIKAWFjK/_bisect.so was downloaded and loaded by /root/statistics/run64

Download and Execute

The file /tmp/_MEIKAWFjK/_heapq.so was downloaded and loaded by /root/statistics/run64

Download and Execute

The file /tmp/_MEIKAWFjK/_locale.so was downloaded and loaded by /root/statistics/run64 15 times

Download and Execute

Process /root/statistics/run64 attempted to access domains: pipera.ro.eu.undernet.org

DNS Query

Process /root/statistics/run64 attempted to access suspicious domains: MustyHay.eu.ix.Undernet.org

DNS Query Access Suspicious Domain

A possibly malicious Package Install was detected

Download Operation Package Install Superuser Operation

Process /usr/lib/apt/methods/http attempted to access domains: _http._tcp.archive.ubuntu.com and archive.ubuntu.com

DNS Query

A possibly malicious Download Operation was detected

Download Operation Package Install Superuser Operation

A possibly malicious Package Install was detected 2 times

Download Operation Package Install Superuser Operation

A possibly malicious Superuser Operation was detected

Download Operation Package Install Superuser Operation

Process /usr/lib/apt/methods/http attempted to access domains: _http._tcp.security.ubuntu.com and security.ubuntu.com

DNS Query

Process /usr/lib/apt/methods/http attempted to access domains: _http._tcp.archive.ubuntu.com and archive.ubuntu.com

DNS Query

Log File Tampering detected from /bin/bash on the following logs: /var/log/lastlog and /var/log/wtmp

Log Tampering

History File Tampering detected from /bin/bash on the following logs: /root/.bash_history

Log Tampering

Connection was closed due to timeout

Process /root/statistics/run64 performed bulk changes in {/tmp/_MEIKAWFjK} on 51 files

Bulk Files Tampering