IP Address: 5.254.112.154Previously Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
5.254.112.154
Previously Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker, Scanner |
Services Targeted |
SSH |
Tags |
SFTP 2 Shell Commands Successful SSH Login DNS Query Port 22 Scan SSH Malicious File Download and Execute Outgoing Connection |
Associated Attack Servers |
tqz3y4w3eq4wi2ay.onion.link 6ppk2oii4hsweqb7.onion.cab zlha65umg7qmprg6.onion.nu gmpsfqrlquaokfl5.onion.link startdedicated.de zlha65umg7qmprg6.onion.link 6ppk2oii4hsweqb7.onion.link hukot.net tqz3y4w3eq4wi2ay.onion.to 6ppk2oii4hsweqb7.onion.to w4gfzjunvynjhpj6.onion.link 188.213.49.65 62.138.11.6 46.36.37.82 192.36.27.5 103.198.0.2 |
IP Address |
5.254.112.154 |
|
Domain |
- |
|
ISP |
Voxility LLP |
|
Country |
United Kingdom |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2017-06-23 |
Last seen in Guardicore Centra |
2018-07-29 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List |
Successful SSH Login |
The file /tmp/bVrSlADyZ4o was downloaded and executed 2 times |
Download and Execute |
Process /tmp/bVrSlADyZ4o generated outgoing network traffic to: 58.28.178.124:22, 220.1.27.149:22, 27.250.17.253:22, 116.46.46.52:22, 14.175.123.132:22, 165.177.225.45:22, 49.161.183.229:22, 205.186.246.114:22, 128.76.223.25:22, 201.118.189.47:22, 134.164.189.25:22, 31.18.18.193:22, 206.102.159.25:22, 17.40.3.162:22, 46.242.37.238:22, 42.100.191.239:22, 191.163.5.174:22, 61.237.59.70:22, 199.9.73.42:22, 155.166.158.244:22, 186.99.79.20:22, 38.182.111.34:22, 178.208.87.240:22, 200.205.41.134:22, 14.158.140.79:22, 141.158.116.212:22, 87.131.20.144:22, 187.22.224.79:22, 96.215.109.56:22, 119.233.152.242:22, 130.135.205.214:22, 35.150.238.90:22, 193.166.241.1:22, 105.21.149.38:22, 180.217.60.193:22, 160.222.127.227:22, 115.153.156.177:22, 86.117.214.170:22, 173.164.70.70:22, 124.36.121.35:22, 143.70.14.32:22, 217.235.135.239:22, 139.196.48.38:22, 221.107.99.83:22, 161.132.242.114:22, 196.188.247.85:22, 8.26.219.249:22, 42.8.176.122:22, 20.122.0.78:22, 132.181.144.7:22, 151.157.251.104:22, 148.162.11.45:22, 39.131.225.138:22, 221.242.243.214:22, 103.198.0.2:80, 109.223.210.31:22, 145.51.149.30:22, 172.238.171.36:22, 16.55.56.242:22, 83.250.188.228:22, 114.156.146.210:22, 112.114.142.40:22, 124.151.184.36:22, 123.17.38.188:22, 61.169.32.254:22, 91.28.228.137:22, 100.9.251.77:22, 202.65.231.136:22, 139.116.246.185:22, 75.83.147.191:22, 190.127.185.41:22, 148.108.55.73:22, 187.92.230.249:22, 152.175.83.55:22, 192.109.142.156:22, 172.116.43.108:22, 144.230.69.117:22, 198.166.3.96:22, 100.254.124.22:22, 208.189.178.196:22, 204.135.44.38:22, 148.66.145.92:22, 4.13.251.66:22, 24.8.102.18:22, 177.86.188.218:22, 208.128.235.154:22, 64.162.161.16:22, 79.128.244.58:22, 171.180.27.237:22, 105.53.104.233:22, 19.38.162.191:22, 194.105.119.123:22, 48.31.134.160:22, 37.146.11.154:22, 95.106.190.48:22, 92.42.16.130:22, 4.6.162.137:22, 102.126.21.111:22, 16.120.232.200:22 and 135.114.62.11:22 |
Outgoing Connection |
Process /tmp/bVrSlADyZ4o scanned port 22 on 99 IP Addresses |
Port 22 Scan |
/tmp/bVrSlADyZ4o was identified as malicious by YARA according to rules: Apt Apt1 and Crypto Signatures |
Malicious File |
/tmp/4WQYOZwkbHwR23N |
SHA256: c2d779e3af5fb536116eaf529f448e2cbbd5462914089cee52de5ee291cd753e |
4390176 bytes |
/tmp/bVrSlADyZ4o |
SHA256: fb229ec335f33284fc90dbf8407d399d41fe112d0577cf64cc9beac32da7dcda |
4390176 bytes |
/tmp/cqjzSiU73By |
SHA256: e62105ab36579f0e55c397d63f757e6a4320e6c7713ccbdfff883e9f53ffdebf |
4390176 bytes |
/tmp/F7IqVO5f |
SHA256: b8d4721ea987582cf08147fd37e6acced139395c5f393dd577a95f7c0f51754b |
4390176 bytes |
/tmp/eBWWDqnvbdDLkrf |
SHA256: 50d60a26c70b45c368acbc11050bbd1a045a782be90fe849243fa5051182a321 |
4390176 bytes |
/tmp/4jNkVBzzYG0J1 |
SHA256: 51e737ad7ab0b48d35742f69cf2768579737af1766db9592fc883799d6d01d4f |
4390176 bytes |
/tmp/sCojBBMFtx |
SHA256: 1040477d7f0879e8b8d240c1f1ee3a2c8269a6c7c376993cb1e864d0b66eab08 |
4390176 bytes |
/tmp/CrXppovrvvRTP |
SHA256: f218a4c375042ce6a92f4d99bf8571feb9330add06df033bc091f6624d53ef5b |
4390176 bytes |
/tmp/jZarcqy5 |
SHA256: 73444f0135a3d20ab2dc8bb6fe959ac22e26ebe5d3672cdb60d7ec5fcf32d4c9 |
4390176 bytes |
IP Address: 5.254.112.154Previously Malicious