IP Address: 94.242.246.23Previously Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
94.242.246.23
Previously Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker |
Services Targeted |
SSH |
Tags |
DNS Query Superuser Operation HTTP Human Download File Download and Allow Execution Outgoing Connection SSH Successful SSH Login Access Suspicious Domain 10 Shell Commands Download Operation Malicious File Read Password Secrets Modification |
Connect Back Servers |
w4gfzjunvynjhpj6.onion.cab archive.ubuntu.com zlha65umg7qmprg6.onion.cab metin2alaska2.16mb.com canonical.com qcuifb2klqqkwc5q.onion.link xmr.pool.minergate.com metin2alaska2.esy.es startdedicated.de zlha65umg7qmprg6.onion.link lmco62zvt7fnezd5.onion.to qcuifb2klqqkwc5q.onion.nu your-server.de igxhhnue75hvk5yc.onion.link 6xfyifncujedhhvn.onion.cab hukot.net 6ppk2oii4hsweqb7.onion.to w4gfzjunvynjhpj6.onion.link 188.213.49.65 62.138.11.6 46.4.120.155 46.36.37.82 31.170.166.225 103.198.0.2 81.4.122.134 185.100.85.150 91.189.88.152 |
IP Address |
94.242.246.23 |
|
Domain |
- |
|
ISP |
root SA |
|
Country |
Luxembourg |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2017-04-25 |
Last seen in Guardicore Centra |
2017-08-21 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using SSH with the following credentials: root / ****** - Authentication policy: White List |
Successful SSH Login |
Process /usr/bin/wget attempted to access suspicious domains: metin2alaska2.16mb.com |
Access Suspicious Domain DNS Query |
Process /usr/bin/wget attempted to access suspicious domains: metin2alaska2.esy.es |
Access Suspicious Domain Outgoing Connection DNS Query |
Process /usr/bin/wget generated outgoing network traffic to: 31.170.166.225:80 |
Outgoing Connection |
Process /usr/lib/apt/methods/http generated outgoing network traffic to: 91.189.88.152:80 |
Outgoing Connection |
Process /usr/lib/apt/methods/http attempted to access domains: archive.ubuntu.com |
DNS Query |
The file /usr/share/doc/unzip was downloaded and granted execution privileges |
Download and Allow Execution |
/usr/bin/unzipsfx.dpkg-new was identified as malicious by YARA according to rules: Crypto Signatures |
Malicious File |
/usr/bin/funzip.dpkg-new was identified as malicious by YARA according to rules: Crypto Signatures |
Malicious File |
/usr/bin/zipinfo.dpkg-new was identified as malicious by YARA according to rules: Crypto Signatures |
Malicious File |
/usr/share/doc/unzip/BUGS.dpkg-new was identified as malicious by YARA according to rules: Packer |
Malicious File |
/root/gosh.zip was downloaded |
Download File |
The file /var/lib/dpkg/tmp.ci/postinst was downloaded and granted execution privileges |
Download and Allow Execution |
The file /var/lib/dpkg/tmp.ci/postrm was downloaded and granted execution privileges |
Download and Allow Execution |
/var/lib/dpkg/available was identified as malicious by YARA according to rules: Malw Miscelanea Linux |
Malicious File |
/var/lib/dpkg/status was identified as malicious by YARA according to rules: Malw Miscelanea Linux |
Malicious File |
The file /usr/bin/zipinfo.dpkg-new was downloaded and granted execution privileges |
Download and Allow Execution |
The file /usr/bin/funzip.dpkg-new was downloaded and granted execution privileges |
Download and Allow Execution |
The file /usr/bin/zipgrep.dpkg-new was downloaded and granted execution privileges |
Download and Allow Execution |
The file /usr/bin/unzipsfx.dpkg-new was downloaded and granted execution privileges |
Download and Allow Execution |
/var/tmp/mina/mina/.v/md |
SHA256: 63210b24f42c05b2c5f8fd62e98dba6de45c7d751a2e55700d22983772886017 |
2979640 bytes |
/var/tmp/mina/mina/.v/mdx |
SHA256: c3ef8a6eb848c99b8239af46b46376193388c6e5fe55980d00f65818dba0b047 |
168896 bytes |
/var/lib/dpkg/tmp.ci/postinst |
SHA256: 6ecdb1415319c81c14a94114a279186a8054c221fe6c63b8a8a2ce38b8b39966 |
111 bytes |
/var/lib/dpkg/tmp.ci/postrm |
SHA256: 27793cfe5796bf9b694e2e2ce532d62917dcad70b64b8a160947f84fd279008a |
78 bytes |
/usr/bin/zipinfo.dpkg-new |
SHA256: 32917004db9408bb8a3e67c06116f69555db53f0f78c1bb49948bf1bdab73bfb |
162488 bytes |
/usr/bin/funzip.dpkg-new |
SHA256: 80ed6b0f255e4646c64c89ad0a3211c79a87c1adcf4d52b24287146ed2520f84 |
22672 bytes |
/usr/bin/zipgrep.dpkg-new |
SHA256: d077ccd18e5719776df7f06b667bda8f7547aa5c3b9cf174c0005608e9309bb8 |
2953 bytes |
/usr/bin/unzipsfx.dpkg-new |
SHA256: c78abf845fcc0c5494a18ae63a03444a6a134b8a33d95fabc80f4145a4d2e550 |
76392 bytes |
/tmp/r9MAa0jfZD8rR |
SHA256: bb8b611d3074b15a9fbe9967c0dd46346cd9f815bae60b3d92678afdd428064e |
4390176 bytes |
/var/tmp/gosh.zip.filepart |
SHA256: ce42f292bf8cf7dca8d0f4cd3ae798b3cc015056d380d5986354f0923475eb13 |
700299 bytes |
/tmp/cqjzSiU73By |
SHA256: e62105ab36579f0e55c397d63f757e6a4320e6c7713ccbdfff883e9f53ffdebf |
4390176 bytes |
/tmp/Om0whdoAsk |
SHA256: 9671e0e757c98f22297ebb4a51fb49ef2ec60a2d52516e5d1368b8ffc1ea1675 |
4390176 bytes |
/tmp/wTDo8tMptjJDlh |
SHA256: 957bf53bc91efd4bc60c775acf5e0377f1f5ff819d818747d084f0832a140f40 |
4390176 bytes |
/tmp/3OjDwN9995 |
SHA256: e83e31dc4668df3f5579d0378f7dce17f6fae85a261b05912803348f5cbf0dfe |
4390176 bytes |
/tmp/sCojBBMFtx |
SHA256: 1040477d7f0879e8b8d240c1f1ee3a2c8269a6c7c376993cb1e864d0b66eab08 |
4390176 bytes |
/tmp/xh |
SHA256: af23482c1e7653739cf15d44aaca4922ba5e5e5bf820e59931f0de0ecdbc697f |
1919887 bytes |
/tmp/VnmKYuu2VqMrL |
SHA256: 5a8fdd61593c064737130296ec0985a115201dd8dfff12dada88f16025ba53bb |
4394272 bytes |
/tmp/zgLzKMHEZxE |
SHA256: 392be2e84dea7841533a69d5cec884d82d7a9fcec8614112413507ddd81df7bd |
4390176 bytes |
/tmp/thRwk1fopqdqz |
SHA256: 93dfe5972eef0062814a3a54461876e15f6dc5cfc1833b4ca5804ef7baeaf4b9 |
4390176 bytes |
/tmp/4MpV0rstX |
SHA256: 1c45cd2bdd910ef24f2213c92ef494d9b8d63ade4dabe7908919c4153adb4413 |
4390176 bytes |
IP Address: 94.242.246.23Previously Malicious