IP Address: 54.39.16.73Previously Malicious
IP Address: 54.39.16.73Previously Malicious
This IP address attempted an attack on a machine in our threat sensors network
Role |
Attacker, Scanner |
Services Targeted |
SCP |
Tags |
IDS - A Network Trojan was detected System File Modification Executable File Modification Download File Service Configuration SSH Scheduled Task Creation Outgoing Connection Access Suspicious Domain SCP 43 Shell Commands Successful SSH Login Download and Execute |
Associated Attack Servers |
ip-139-99-62.net ip-51-81-151.us 37.59.43.131 51.81.151.235 88.99.242.92 94.130.164.163 94.130.165.87 139.99.62.196 139.99.120.75 158.69.25.77 |
IP Address |
54.39.16.73 |
|
Domain |
- |
|
ISP |
OVH Hosting |
|
Country |
Canada |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Akamai Guardicore Segmentation |
2020-07-04 |
Last seen in Akamai Guardicore Segmentation |
2021-03-04 |
What is Akamai Guardicore SegmentationAkamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List |
Successful SSH Login |
/bin/xokknc97h9y5qyjlxaoujyvjer was downloaded |
Download File |
Executable file /bin/xokknc97h9y5qyjlxaoujyvjer was modified |
Executable File Modification |
The file /bin/dhpcd was downloaded and executed 15 times |
Download and Execute |
IDS detected A Network Trojan was detected : DNS request for Monero mining pool |
IDS - A Network Trojan was detected |
Process /bin/dhpcd generated outgoing network traffic to: 139.99.120.75:4444, 139.99.120.75:80, 88.99.242.92:4444 and 88.99.242.92:80 |
Outgoing Connection |
Process /bin/dhpcd attempted to access suspicious domains: ip-139-99-120.net |
Access Suspicious Domain Outgoing Connection |
System file /etc/nshadow was modified 9 times |
System File Modification |
/dev/shm/xokknc97h9y5qyjlxaoujyvjer was downloaded |
Download File |
/dev/shm/knrm was downloaded |
Download File |
/dev/shm/r was downloaded |
Download File |
System file /etc/sedzZmRjJ was modified 9 times |
System File Modification |
Executable file /bin/dhpcd was modified |
Executable File Modification |
/bin/dhpcd was downloaded |
Download File |
/etc/rc.local was downloaded |
Download File |
System file /etc/rc.local was modified 4 times |
System File Modification |
Connection was closed due to timeout |
|