IP Address: 222.187.238.208Previously Malicious

Weekly Summary

Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network

Top Threats

Cyber Threat Intelligence

Discover Malicious IPs and Domains with Guardicore Cyber Threat Feed

IP Address:
222.187.238.208​
Previously Malicious

This IP address attempted an attack on a machine protected by Guardicore Centra

Threat Information

Role

Attacker, Scanner

Services Targeted

SSH

Tags

Log Tampering HTTP Service Stop DNS Query Download and Allow Execution Service Configuration Download File Download Operation Access Suspicious Domain Download and Execute Listening Malicious File SSH Successful SSH Login 12 Shell Commands Outgoing Connection

Associated Attack Servers

mdb7.cn raw.githubusercontent.com mine.ppxxmr.com pool.minexmr.cn

103.60.164.110 103.238.225.44 103.60.164.109 151.101.0.133 151.101.32.133 222.187.232.9

Basic Information

IP Address

222.187.238.208

Domain

-

ISP

China Telecom jiangsu

Country

China

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Guardicore Centra

2018-06-17

Last seen in Guardicore Centra

2018-07-15

What is Guardicore Centra
Guardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / ******** - Authentication policy: White List

Successful SSH Login

Process /usr/sbin/sshd started listening on ports: 1987 and 22

Listening

Service iptables was stopped

Service Stop

A possibly malicious Download Operation was detected 4 times

Download Operation

Process /usr/bin/wget attempted to access suspicious domains: mdb7.cn

DNS Query Access Suspicious Domain

Log File Tampering detected from /bin/rm on the following logs: /var/log/wtmp

Log Tampering

Process /usr/bin/wget generated outgoing network traffic to: 103.238.225.44:2485

Outgoing Connection

The file /root/zwkos was downloaded and executed 11 times

Download and Execute

The file /etc/rc.local was downloaded and granted execution privileges 3 times

Download and Allow Execution

The file /root/xxsdwakzwkos was downloaded and executed 10 times

Download and Execute

Process /root/xxsdwakzwkos generated outgoing network traffic to: 222.187.232.9:7777 and 151.101.0.133:443

Outgoing Connection

Connection was closed due to timeout

/root/xxszznk was identified as malicious by YARA according to rules: Crypto Signatures and Malw Pe Sections

Malicious File

/root/.cnrig.cacert.pem was identified as malicious by YARA according to rules: Malw Pe Sections

Malicious File

/root/xxsdwakzwkos was identified as malicious by YARA according to rules: Crypto Signatures and Malw Pe Sections

Malicious File

/root/zwkos was identified as malicious by YARA according to rules: Crypto Signatures and Malw Pe Sections

Malicious File

Associated Files

/etc/sedzksxtH

SHA256: bb32aeed4f6e2a1f5c8f0046658dd243954f07671e6757e0bfd77b937394b5fc

233 bytes

/root/xxsdwakzwkos

SHA256: 7d586597dbea1071ecba17cc9e8d310c0d385f204104bc0a7e910d9c9a299032

1041239 bytes

/root/linuxxzwy

SHA256: 4e358dc919d909f270195099b6e3763beb913b0555d6ea265ba1cf2fd95a7890

3239584 bytes

/etc/sedsvWe6x

SHA256: 251f2bafaec92392d83b7664dcb2214de762df4ffc5ad5b2478b0db6ec3bad20

256 bytes

/root/zwkos

SHA256: e4eab741f001cea55b4d8b3e3034147eb1804e4507798f2a61e76477154b46eb

3239584 bytes

/etc/sedvKONmu

SHA256: 51efd27fa9c7ef608e65f04c08a98fb0abfac51ff106a68017c2c512b24e2d64

252 bytes

Oops! - Do you see your IP here? Contact us at labs@guardicore.com to remove it from the Threat Intelligence data.

IP Address: 222.187.238.208​Previously Malicious