Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 31.210.20.60Previously Malicious

IP Address: 31.210.20.60Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Connect-Back, Scanner

Services Targeted

SSH

Tags

Download Operation HTTP Log Tampering Download File SSH Brute Force SSH Successful SSH Login Download and Execute 1 Shell Commands Outgoing Connection Download and Allow Execution

Associated Attack Servers

2.56.57.98 143.198.231.66 177.38.182.41 193.23.4.8 193.227.50.220 194.27.118.1

Basic Information

IP Address

31.210.20.60

Domain

-

ISP

Kiobi B.V.

Country

Netherlands

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2022-03-30

Last seen in Akamai Guardicore Segmentation

2022-04-24

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List (Part of a Brute Force Attempt)

SSH Brute Force Successful SSH Login

A possibly malicious Download Operation was detected 2 times

Download Operation

History File Tampering detected from /usr/sbin/sshd

Log Tampering

Process /usr/bin/wget generated outgoing network traffic to: 31.210.20.60:80

Outgoing Connection

The file /tmp/SnOoPy.sh was downloaded and granted execution privileges

Download and Allow Execution

Process /usr/local/bin/dash generated outgoing network traffic to: 31.210.20.60:80

Outgoing Connection

The file /tmp/m-i.p-s.SNOOPY was downloaded and granted execution privileges

Download and Allow Execution

Process /usr/local/bin/dash generated outgoing network traffic to: 31.210.20.60:80

Outgoing Connection

The file /tmp/m-p.s-l.SNOOPY was downloaded and granted execution privileges

Download and Allow Execution

Process /usr/bin/wget generated outgoing network traffic to: 31.210.20.60:80 4 times

Outgoing Connection

/tmp/s-h.4-.SNOOPY was downloaded

Download File

The file /tmp/s-h.4-.SNOOPY was downloaded and granted execution privileges

Process /usr/local/bin/dash generated outgoing network traffic to: 31.210.20.60:80 2 times

Outgoing Connection

The file /tmp/x-8.6-.SNOOPY was downloaded and executed 3 times

Download and Execute

Process /tmp/x-8.6-.SNOOPY generated outgoing network traffic to: 31.210.20.60:839

Outgoing Connection

Process /usr/bin/wget generated outgoing network traffic to: 31.210.20.60:80 2 times

Outgoing Connection

The file /tmp/a-r.m-6.SNOOPY was downloaded and granted execution privileges

The file /tmp/x-3.2-.SNOOPY was downloaded and executed 2 times

Download and Execute

The file /tmp/a-r.m-7.SNOOPY was downloaded and granted execution privileges

Process /usr/local/bin/dash generated outgoing network traffic to: 31.210.20.60:80

Outgoing Connection

The file /tmp/p-p.c-.SNOOPY was downloaded and granted execution privileges

Process /usr/bin/wget generated outgoing network traffic to: 31.210.20.60:80

Outgoing Connection

The file /tmp/i-5.8-6.SNOOPY was downloaded and granted execution privileges

Download and Allow Execution

Process /usr/bin/wget generated outgoing network traffic to: 31.210.20.60:80

Outgoing Connection

The file /tmp/p-p.c-.SNOOPY was downloaded and granted execution privileges

Download and Allow Execution

The file /tmp/a-r.m-4.SNOOPY was downloaded and granted execution privileges

Download and Allow Execution

/tmp/a-r.m-5.SNOOPY was downloaded

Download File

The file /tmp/a-r.m-5.SNOOPY was downloaded and granted execution privileges

Connection was closed due to timeout

Associated Files

/tmp/p-p.c-.SNOOPY

SHA256: 03f8928a5e6789403db0f3755627e04f327dd236eaedd49cb0721b9837d816e9

97583 bytes

/tmp/x-3.2-.SNOOPY

SHA256: 0540bf9561768b2a46c0b57134d088060e4fd6a2ffa33799ab58b19b9a6ee17b

74069 bytes

/tmp/yoyobins.sh

SHA256: 0645e7f78c29233afc3c175ffc1c8d92b381533c468a75d1e11598248821f3fb

1504 bytes

/tmp/hahahaha.sh

SHA256: 306b5745054cab7a000edf375dd4409935c6ff704dff0860a3563a04b3fa8e66

1107 bytes

/tmp/x-8.6-.SNOOPY

SHA256: 30fdc525c60dfa5eccf96a5a39da711512c0ff8631a0554a109f5ecc2a887e1d

85864 bytes

/tmp/mipsel

SHA256: 4c0f73e8a222a1aacb84867f62864bd932262034e2e5aab125028f3fbe10c06a

120016 bytes

/tmp/i-5.8-6.SNOOPY

SHA256: 605b5d10a7eba3a81571b81f82e8e709978e5e1fa1b01ce14afb8b3ab1542251

91132 bytes

/tmp/a-r.m-7.SNOOPY

SHA256: 7239f59ef46b6aa968b266d856a56341581355f48517f4f26b3be2b12586f85a

84841 bytes

/tmp/powerpc

SHA256: 8750a98486d454362d3deb184af5bd16eb68d4576686d028971865968cf6903d

58924 bytes

/tmp/x86_64

SHA256: 968af4a7dad7fff77086b8498c6ac8ea930243378e0220a8f3b954f25f0a949a

52296 bytes

/tmp/a-r.m-5.SNOOPY

SHA256: a9a2354bea3b64170cca0ae2ff4500c1f344bfcd2617d914a3be1bb5d0f4163e

92493 bytes

/tmp/arm7

SHA256: b70b931296663d74db2085b3702a9e84ca0a093009fc4d83876b1b67f753ab62

77212 bytes

/tmp/mipsel

SHA256: c34ed4437547d633cb8b4d26dd459ea7bc2a6f96857a22a8f015b81552a541f0

155476 bytes

/tmp/m-i.p-s.SNOOPY

SHA256: c7020125ec6038d88b0d1454cfa9e09ddb8d6a91876becf03a27287aff86d85e

113320 bytes

/tmp/mips

SHA256: ef2453137001132be313014ee7282e29a49ef4241346c29e294865d1e28578ed

155428 bytes

/tmp/SnOoPy.sh

SHA256: f2d804b9253a992121d095964ae963686bb18345f9d239a4ac4c7636835778d9

2085 bytes