IP Address: 217.115.10.131Previously Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
217.115.10.131
Previously Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker, Scanner |
Services Targeted |
SCP SSH |
Tags |
Successful SSH Login Download and Execute Malicious File 24 Shell Commands Outgoing Connection Scheduled Task Creation Networking Operation SSH SCP Protect File Download File |
Associated Attack Servers |
6ppk2oii4hsweqb7.onion.cab igxhhnue75hvk5yc.onion.nu lmco62zvt7fnezd5.onion.to startdedicated.de hukot.net 188.213.49.65 62.138.11.6 46.36.37.82 185.206.146.35 185.100.85.150 |
IP Address |
217.115.10.131 |
|
Domain |
- |
|
ISP |
Netsign Networks GmbH |
|
Country |
- |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2017-07-17 |
Last seen in Guardicore Centra |
2018-05-02 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List |
Successful SSH Login |
The file /tmp/pinger was downloaded and executed 8 times |
Download and Execute |
/root/.system/ls was downloaded |
Download File |
/root/.system/lsof was downloaded |
Download File |
/root/.system/netstat was downloaded |
Download File |
/root/.system/ps was downloaded |
Download File |
/root/.system/pstree was downloaded |
Download File |
/root/.system/ss was downloaded |
Download File |
/root/.system/top was downloaded |
Download File |
/usr/bin/.yam was downloaded |
Download File |
The file /usr/bin/.main was downloaded and executed 6 times |
Download and Execute |
The file /usr/bin/.xmrig was downloaded and executed 7 times |
Download and Execute |
Process /usr/bin/.xmrig generated outgoing network traffic to: 185.206.146.35:4444 |
Outgoing Connection |
Connection was closed due to timeout |
|
/root/.system/lsof was identified as malicious by YARA according to rules: Javascript Exploit And Obfuscation |
Malicious File |
/root/.system/top was identified as malicious by YARA according to rules: Javascript Exploit And Obfuscation |
Malicious File |
/usr/bin/.xmrig was identified as malicious by YARA according to rules: Crypto Signatures |
Malicious File |
/root/.system/netstat was identified as malicious by YARA according to rules: Javascript Exploit And Obfuscation |
Malicious File |
/root/.system/ss was identified as malicious by YARA according to rules: Javascript Exploit And Obfuscation |
Malicious File |
/root/.system/pstree was identified as malicious by YARA according to rules: Javascript Exploit And Obfuscation |
Malicious File |
/root/.system/ls was identified as malicious by YARA according to rules: Javascript Exploit And Obfuscation |
Malicious File |
/root/.system/ps was identified as malicious by YARA according to rules: Javascript Exploit And Obfuscation |
Malicious File |
/tmp/pinger |
SHA256: bc56a689943679c7018b38b0349fb4bd9f9c957328949aed0d5a370dc12620c7 |
2146144 bytes |
/root/.system/top |
SHA256: a518beea171accec8553b02414e1ffba0b49b0592d58f406efc24ccf79cab873 |
1321504 bytes |
/usr/bin/.xmrig |
SHA256: bd14bc3cfd9528e4a7583ab39aecc876250333e1e0faab83781584bb7f65e3eb |
1844640 bytes |
/usr/bin/.main |
SHA256: 9f8361f6f0baeca8504d88eac23575ad8aaac3639f692e5df6d5dbf6af31d811 |
1458912 bytes |
/tmp/3H60TZX9 |
SHA256: c04cf76066fa0829b41835ba4e27602eb5cb7a30a906aed90b3c2bf6f1d8394a |
4390176 bytes |
/tmp/cqjzSiU73By |
SHA256: e62105ab36579f0e55c397d63f757e6a4320e6c7713ccbdfff883e9f53ffdebf |
4390176 bytes |
/tmp/BL8CEnSyY867ne |
SHA256: e5b4789119007fd53b4f41daa2355865590306fe364245988c295eac5964034b |
4390176 bytes |
IP Address: 217.115.10.131Previously Malicious