Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 15.235.199.144Malicious

IP Address: 15.235.199.144Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Scanner

Services Targeted

SSH

Tags

Download and Execute Download and Allow Execution Service Restart Access Suspicious Domain Read Password Secrets System File Modification Outgoing Connection Listening Executable File Modification Successful SSH Login SSH New SSH Key

Associated Attack Servers

cubecloud.net

47.237.5.47 103.101.153.27

Basic Information

IP Address

15.235.199.144

Domain

-

ISP

-

Country

Singapore

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2024-04-27

Last seen in Akamai Guardicore Segmentation

2024-04-27

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / ****** - Authentication policy: White List

Successful SSH Login

Process /bin/bash generated outgoing network traffic to: 103.101.153.27:60100

Outgoing Connection

Process /bin/bash attempted to access suspicious domains: cubecloud.net

Access Suspicious Domain Outgoing Connection

System file /etc/crontab was modified

System File Modification

Executable file /usr/bin/wgbtx was modified

Executable File Modification

System file /etc/nshadow was modified 81 times

System File Modification

The file /tmp/9jFQyGQAbS was downloaded and executed 16 times

Download and Execute

Process /tmp/9jFQyGQAbS started listening on ports: 60130

Listening

System file /etc/ssh/sshd_config was modified 4 times

System File Modification

Process /tmp/9jFQyGQAbS generated outgoing network traffic to: 47.237.5.47:60100

Outgoing Connection

Process /lib/systemd/systemd started listening on ports: 22

Listening

An attempt to download /root/.ssh/authorized_keys was made

New SSH Key

Connection was closed due to timeout

Associated Files

/tmp/o2qjqvM7iJ

SHA256: 933beaec399d813b4b4abcf825e62b662eaf7040b30ccf4d2c9a041085bea5d5

1911588 bytes