Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 81.161.229.49Previously Malicious

IP Address: 81.161.229.49Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Scanner

Services Targeted

SSH

Tags

Download Operation SSH Listening Package Install Outgoing Connection HTTP Download and Allow Execution Successful SSH Login Download and Execute Download File Access Suspicious Domain

Associated Attack Servers

ip-80-160-bullethost.net ip-80-173-bullethost.net

5.181.80.160 5.181.80.173 81.161.229.116

Basic Information

IP Address

81.161.229.49

Domain

-

ISP

-

Country

-

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2022-08-11

Last seen in Akamai Guardicore Segmentation

2022-09-03

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SSH with the following credentials: root / **** - Authentication policy: White List

Successful SSH Login

A possibly malicious Download Operation was detected

Download Operation Package Install

A possibly malicious Package Install was detected

Download Operation Package Install

Process /usr/bin/wget generated outgoing network traffic to: 81.161.229.116:80

Outgoing Connection

The file /tmp/x86.sh was downloaded and granted execution privileges

Process /usr/bin/wget generated outgoing network traffic to: 81.161.229.116:80

Outgoing Connection

/tmp/mips was downloaded

Download File

The file /tmp/mips was downloaded and granted execution privileges

Process /usr/local/bin/dash generated outgoing network traffic to: 81.161.229.116:80

Outgoing Connection

The file /tmp/mipsel was downloaded and granted execution privileges

Process /usr/local/bin/dash generated outgoing network traffic to: 81.161.229.116:80

Outgoing Connection

Process /tmp/x86_64 started listening on ports: 6628

Listening

The file /tmp/x86_64 was downloaded and executed 3 times

Download and Execute

Process /usr/bin/wget generated outgoing network traffic to: 81.161.229.116:80

Outgoing Connection

Process /tmp/x86_64 generated outgoing network traffic to: 5.181.80.173:1972

Outgoing Connection

Process /tmp/x86_64 attempted to access suspicious domains: ip-80-173-bullethost.net

Access Suspicious Domain Outgoing Connection

/tmp/arm7 was downloaded

Download File

The file /tmp/arm7 was downloaded and granted execution privileges

Process /usr/bin/wget generated outgoing network traffic to: 81.161.229.116:80

Outgoing Connection

The file /tmp/arm was downloaded and granted execution privileges

Process /usr/bin/wget generated outgoing network traffic to: 81.161.229.116:80 2 times

Outgoing Connection

Process /tmp/x86_64 started listening on ports: 1035

Listening

The file /tmp/arm6 was downloaded and granted execution privileges

The file /tmp/arm5 was downloaded and granted execution privileges

Download and Allow Execution

Process /usr/local/bin/dash generated outgoing network traffic to: 81.161.229.116:80

Outgoing Connection

The file /tmp/arc was downloaded and granted execution privileges

Download and Allow Execution

Process /usr/local/bin/dash generated outgoing network traffic to: 81.161.229.116:80

Outgoing Connection

/tmp/i586 was downloaded

Download File

Connection was closed due to timeout

Associated Files

/tmp/X86_64.1

SHA256: 025cf96244ec733791eec96fcb17861ca3a911ecfd5ab5ca0506ff674037287f

40176 bytes

/tmp/X86_64

SHA256: 059442f81b57b9e66cc58863af155ec5a1fae385862e34438952fbde2c2c7b8d

60396 bytes

/tmp/arm7.1

SHA256: 1143de19ede87ed8d9689eae657e505f485a0f9816b1c5bd6bdbd81eb7e355b0

127636 bytes

/tmp/X86_64.1

SHA256: 131c70062e5ab642047b0199eb445bdd2b426cb82b3276d6a284ca034088f9b2

56352 bytes

/tmp/X86_64.1

SHA256: 3512862e61e6d56000663497affe1bad0bcc7c6e3b143c971926d108c5ae15d1

13216 bytes

/tmp/X86_64.1

SHA256: 496f7df8d7ac2787ac13cf4a487bef8e9980db43cf05bc05bd0f49e8f1a87cd0

85728 bytes

/tmp/X86_64

SHA256: 65904d67c9fc273623a85cf2475f82cb89942ba2934314232b7596df7c3e72ea

18608 bytes

/tmp/mips

SHA256: 790143dc4932540f563f94e35c0d1de3098ace31b47867867456d61ace890ca6

71664 bytes

/tmp/X86_64.1

SHA256: 8525732543a3b0d3aba28cf7bcdef3d29bdd1a2dc92500d6c5c826c4e4103de1

32088 bytes

/tmp/i586

SHA256: 8eb3713acb6e41bd0be0ff260b06cb834241f83a98d42d877088500bcc7e8551

49936 bytes

/tmp/X86_64.1

SHA256: 9695a3ba19727d49198ac476953f3f81ed6b9a655f9ccadabba6f7f5c19bd0fe

26696 bytes

/tmp/mipsel

SHA256: 996d6aba886835f9a66c85eb249fb366efbd75b646287c461b2cdf1a298117c5

71664 bytes

/tmp/arm5

SHA256: 99a856393205ca6f214dc1629628c75e3631a1118aa520ac38067a6f2b8d7e28

46316 bytes

/tmp/X86_64

SHA256: bc1a00f39d63891c075f2d0d3ed316d62f46408d10a9e936f9c9a315afd1d87c

55004 bytes

/tmp/arm6

SHA256: cc5a01f5b4c9d04addde771815e89d209633c4197c9799b7d9c53549cf97e0b9

127636 bytes

/tmp/arm

SHA256: d388574bed269d2aa8cfc78e48f9ed58473eb3c3cccfb95885064cdd6f623593

55032 bytes

/tmp/X86_64

SHA256: e7268d34f9e54853583a513e6b8a1455c94f65b77902cb907b1fc5ba7ad0fcaa

80616 bytes

/tmp/x86_64

SHA256: f5a37b4edbd847407c42e6f7d68ffbf9b091ea5f78cc880c0ba4bbdd3f982715

54528 bytes