Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 2.56.57.106Previously Malicious

IP Address: 2.56.57.106Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Scanner

Services Targeted

SSH

Tags

Outgoing Connection Download Operation Successful SSH Login SSH Brute Force Download File SSH Download and Execute Download and Allow Execution Listening Package Install HTTP Access Suspicious Domain 4 Shell Commands

Associated Attack Servers

36.67.16.127

Basic Information

IP Address

2.56.57.106

Domain

-

ISP

Legaco Networks B.V.

Country

United States

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2022-04-18

Last seen in Akamai Guardicore Segmentation

2022-05-16

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List (Part of a Brute Force Attempt)

SSH Brute Force Successful SSH Login

A user logged in using SSH with the following credentials: root / **** - Authentication policy: Correct Password (Part of a Brute Force Attempt)

SSH Brute Force Successful SSH Login

A possibly malicious Download Operation was detected

Download Operation Package Install

A possibly malicious Package Install was detected

Download Operation Package Install

A possibly malicious Download Operation was detected

Download Operation Package Install

A possibly malicious Package Install was detected

Download Operation Package Install

A possibly malicious Download Operation was detected

Download Operation Package Install

A possibly malicious Package Install was detected

Download Operation Package Install

A possibly malicious Download Operation was detected

Download Operation Package Install

A possibly malicious Package Install was detected

Download Operation Package Install

Process /usr/bin/wget generated outgoing network traffic to: 2.56.56.182:80

Outgoing Connection

Process /bin/bash generated outgoing network traffic to: 2.56.56.182:80

Outgoing Connection

Process /usr/bin/wget attempted to access suspicious domains: servebeer.com

Access Suspicious Domain Outgoing Connection

Process /bin/bash attempted to access suspicious domains: servebeer.com

Access Suspicious Domain Outgoing Connection

The file /tmp/mysql.sock.lock was downloaded and granted execution privileges

The file /tmp/x86.sh was downloaded and granted execution privileges 2 times

Download and Allow Execution

The file /tmp/x86.sh.1 was downloaded and granted execution privileges

Download and Allow Execution

Process /usr/local/bin/dash generated outgoing network traffic to: 2.56.56.182:80

Outgoing Connection

Process /usr/local/bin/dash attempted to access suspicious domains: servebeer.com

Access Suspicious Domain Outgoing Connection

Process /usr/local/bin/dash generated outgoing network traffic to: 2.56.56.182:80

Outgoing Connection

Process /usr/local/bin/dash attempted to access suspicious domains: servebeer.com

Access Suspicious Domain Outgoing Connection

/tmp/x86_64.1 was downloaded

Download File

The file /tmp/x86_64 was downloaded and executed 9 times

Download and Execute

Process /usr/local/bin/dash started listening on ports: 6628

Listening

A user logged in using SSH with the following credentials: root / **** - Authentication policy: Correct Password (Part of a Brute Force Attempt) 2 times

SSH Brute Force Successful SSH Login

A possibly malicious Download Operation was detected

Download Operation Package Install

A possibly malicious Package Install was detected

Download Operation Package Install

A possibly malicious Download Operation was detected

Download Operation Package Install

A possibly malicious Package Install was detected

Download Operation Package Install

Process /usr/bin/wget generated outgoing network traffic to: 2.56.56.182:80

Outgoing Connection

Process /usr/bin/wget attempted to access suspicious domains: servebeer.com

Access Suspicious Domain Outgoing Connection

A possibly malicious Download Operation was detected

Download Operation Package Install

A possibly malicious Package Install was detected

Download Operation Package Install

A possibly malicious Download Operation was detected

Download Operation Package Install

A possibly malicious Package Install was detected

Download Operation Package Install

Process /bin/bash generated outgoing network traffic to: 2.56.56.182:80

Outgoing Connection

Process /bin/bash attempted to access suspicious domains: servebeer.com

Access Suspicious Domain Outgoing Connection

Process /usr/local/bin/dash generated outgoing network traffic to: 2.56.56.182:80

Outgoing Connection

Process /usr/local/bin/dash attempted to access suspicious domains: servebeer.com

Access Suspicious Domain Outgoing Connection

The file /tmp/x86.sh.2 was downloaded and granted execution privileges

Download and Allow Execution

Process /usr/bin/wget generated outgoing network traffic to: 2.56.56.182:80

Outgoing Connection

Process /usr/bin/wget attempted to access suspicious domains: servebeer.com

Access Suspicious Domain Outgoing Connection

Process /tmp/x86_64 started listening on ports: 6628

Listening

/tmp/x86_64.2 was downloaded

Download File

Process /tmp/x86_64 generated outgoing network traffic to: 2.56.56.182:6473

Outgoing Connection

Process /tmp/x86_64 attempted to access suspicious domains: servebeer.com

Access Suspicious Domain Outgoing Connection

Process /tmp/x86_64 started listening on ports: 62930

Listening

Connection was closed due to timeout

Associated Files

/tmp/x86_64

SHA256: 01bd8fa853cdb4642f93bd3a99c3b50e2e8a78b414f4c5939462a3800f8c044e

3781 bytes

/tmp/x86_64

SHA256: 0729d6c8a1567919692fe7bbbc2274236f8f1b42fff3b43852ec8d9c5afcefb3

13217 bytes

/tmp/x86_64

SHA256: 21dc13ac7ae269e6097536297639abe747a44b20f88c134e4e5d3b7fe41471ea

28045 bytes

/tmp/x86_64

SHA256: 2c433ff408db66e3d52ee32c89a06b8b8791906451f6c344ee1b8b3688af8c6f

33437 bytes

/tmp/x86_64

SHA256: 31e5d0996dd877bc29e3a978a8092853647436b942b809eb960b47f908229bef

24001 bytes

/tmp/x86_64

SHA256: 438db9c4bbad65f7fbfb99ea29fc757dcb626a21bebe9f7842c08750fd59d520

25349 bytes

/tmp/x86_64

SHA256: 6bd2c496f35367dbdf3386bcc9b00ef3996c60e46f665cd5f2f54d0a3fa0a471

37481 bytes

/tmp/x86_64

SHA256: b4705d067a5f2178bdb00e7d8fd23f24289181a255ae4dcc47e69a77eef921e1

40177 bytes

/tmp/x86_64

SHA256: c1f207470a8b9f6b235a6d2a6ebf999fd6f785e89087fbed1816bf8e12a3397e

9173 bytes

/tmp/x86_64

SHA256: c9d92d04e67e4584ce9da51668ea82bbc1b44dcb16f663c3f6a0a793f7aa8045

41525 bytes

/tmp/x86_64.2

SHA256: e488d1820cf0ec553f64ee31c51bef53ef2b240e1a92160cbdf869a37b44d941

54528 bytes

/tmp/x86_64

SHA256: e7edc960903e847da1522792cddfcac8dda3c79f4466999ef925d74b1f9bc23c

36133 bytes

/tmp/x86_64.1

SHA256: f7eab161f18829f3c8ad3f5f39b69c0604eb205a0581c8fcb20e87c9b58f7f9a

40177 bytes

/tmp/x86_64

SHA256: ff58469b2c27e56e0f9ada4bd92cdfb811a0402db77abab627ba7b42391c59f8

21305 bytes