Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 37.0.10.28Previously Malicious

IP Address: 37.0.10.28Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Connect-Back, Scanner

Services Targeted

SSH

Tags

Download Operation HTTP Outgoing Connection Successful SSH Login 1 Shell Commands Log Tampering SSH Download File Download and Allow Execution

Associated Attack Servers

aggiornamento.xyz

2.58.149.26 45.144.225.188 101.132.156.226 136.144.41.41

Basic Information

IP Address

37.0.10.28

Domain

-

ISP

M. van Offeren trading as Yourname

Country

Netherlands

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2021-11-01

Last seen in Akamai Guardicore Segmentation

2021-12-26

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List

Successful SSH Login

A possibly malicious Download Operation was detected 3 times

Download Operation

Process /usr/bin/wget generated outgoing network traffic to: 2.58.149.26:80 3 times

Outgoing Connection

/var/tmp/.senpai.loader was downloaded

Download File

The file /var/tmp/.senpai.loader was downloaded and granted execution privileges

Download and Allow Execution

Process /usr/bin/wget generated outgoing network traffic to: 2.58.149.26:80 12 times

Outgoing Connection

History File Tampering detected from /bin/rm on the following logs: /root/.bash_history

Log Tampering

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.x86 was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.mips was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.mpsl was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.arm was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.arm5 was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.arm6 was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.arm7 was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.ppc was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.m68k was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.sh4 was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.i486 was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.i586 was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.i686 was downloaded

Download File

/var/tmp/.UnixPizde/b4ngl4d3shS3N941.mipsel was downloaded

Download File

A user logged in using SSH with the following credentials: root / **** - Authentication policy: Correct Password

Successful SSH Login

Process /bin/bash generated outgoing network traffic to: 2.58.149.26:80

Outgoing Connection

Connection was closed due to user inactivity