176.113.115.239 Threat Intelligence and Host Information

Share on:

General

This page contains threat intelligence information for the IPv4 address 176.113.115.239 and was generated either as a result of observed malicious activity or as an information gathering exercise to assist with enrichment of security events and context. All information is gathered passively through aggregation of public sources, or observations through activity upon honeynets. The host score is calculated through a series of statistically weighted values and machine learning which takes into account metadata such as host information, frequency, volume and global distribution of malicious activity, association with other known malicious hosts or networks, proxying or anonymising behaviour such as with tor exit nodes, residential proxies or VPN services, and many other attributes. These values are historical and indicative only - and should not be taken to be an accurate representation of the users, businesses or networks in which they reside.

Likely Malicious Host 🟠 70/100

Host and Network Information

  • Mitre ATT&CK IDs: T1003 - OS Credential Dumping, T1005 - Data from Local System, T1008 - Fallback Channels, T1011 - Exfiltration Over Other Network Medium, T1016 - System Network Configuration Discovery, T1025 - Data from Removable Media, T1027 - Obfuscated Files or Information, T1036 - Masquerading, T1048 - Exfiltration Over Alternative Protocol, T1049 - System Network Connections Discovery, T1053 - Scheduled Task/Job, T1055 - Process Injection, T1056 - Input Capture, T1057 - Process Discovery, T1059 - Command and Scripting Interpreter, T1071 - Application Layer Protocol, T1082 - System Information Discovery, T1083 - File and Directory Discovery, T1087 - Account Discovery, T1091 - Replication Through Removable Media, T1092 - Communication Through Removable Media, T1095 - Non-Application Layer Protocol, T1098 - Account Manipulation, T1102 - Web Service, T1105 - Ingress Tool Transfer, T1112 - Modify Registry, T1114 - Email Collection, T1119 - Automated Collection, T1202 - Indirect Command Execution, T1203 - Exploitation for Client Execution, T1217 - Browser Bookmark Discovery, T1219 - Remote Access Software, T1486 - Data Encrypted for Impact, T1489 - Service Stop, T1490 - Inhibit System Recovery, T1497 - Virtualization/Sandbox Evasion, T1518 - Software Discovery, T1539 - Steal Web Session Cookie, T1543 - Create or Modify System Process, T1546 - Event Triggered Execution, T1547 - Boot or Logon Autostart Execution, T1548 - Abuse Elevation Control Mechanism, T1552 - Unsecured Credentials, T1553 - Subvert Trust Controls, T1555 - Credentials from Password Stores, T1562 - Impair Defenses, T1564 - Hide Artifacts, T1566 - Phishing, T1568 - Dynamic Resolution, T1569 - System Services, T1571 - Non-Standard Port, T1574 - Hijack Execution Flow, T1613 - Container and Resource Discovery
  • Tags: RDP, appdata, bifrost, bitcoin, bladabindi, center, cerber, compromiseiocs, darkcomet, defender, dropper, eternalblue, express, gh0strat, glupteba, hashessee json, ioc searching, iocs, json file, leave, local, lokibot, march, microsoft word, mitre att, netwire, ramnit, rats, service, shell, system32, t1027, ta0002, ta0003, ta0004, ta0005, ta0007, ta0011, talos, temp, threat roundup, tinba, tofsee, tools, trojan, upatre, ursu, zusy

  • View other sources: Spamhaus VirusTotal

  • Country: Russia
  • Network: AS49505 ooo network of data-centers selectel
  • Noticed: 32 times
  • Protcols Attacked: Anonymous Proxy

Malware Detected on Host

Count: 699 5951fb3f9008575660a01768aac8c7246a2cce92140dcd03e03e7e3bbbbbb9c9 78cbc621a9bb1b329367e17a7d44a81fd9bc1c01f84c7024ba2d1165b86ef8a5 26dfa9d69f183cbbaa8637dbf8eba7fadb78a6671f1bb06ef091c547c7020c6a 786ee5ea7faa9243b06323197030d7bf4d3974504059e842c8818f41b658bd8c 61eeae66b61ef2e3e0e76910bdd0c79d240df8f51db9e90b67328f0fecf6fa73 460c08f0b59b0431d8fab4ae8169c957fbde5c077e7f15ba5b3cacd924db4714 91aa6e0fd5cdd552cf41e62743b3b940927a1dca2e6d081c5b4afbb6d3d2e5b3 d63cea2857c3a744d5ecba8e6ec3817b0fa9edd59329a910c0d1e71df5c5d209 a1ae2b8aed2be51dfe11906ba66b4b9f528d7ee5bca4f27168cf5235117d25ea 8070d404549c2d4e3e7797209c1d84de33523229c278dc2a40f209e2f1524e05

Open Ports Detected

33060 35000 37215 41800 444 44818 49153 50000 50050 51106 51235 52869 54138 55554 60129 61616 62078 8080

CVEs Detected

CVE-2006-20001 CVE-2013-4352 CVE-2013-5704 CVE-2013-6438 CVE-2014-0098 CVE-2014-0117 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 CVE-2014-3523 CVE-2014-3581 CVE-2014-8109 CVE-2015-0228 CVE-2015-3183 CVE-2015-3184 CVE-2015-3185 CVE-2016-0736 CVE-2016-2161 CVE-2016-4975 CVE-2016-5387 CVE-2016-8612 CVE-2016-8743 CVE-2017-15710 CVE-2017-15715 CVE-2017-3167 CVE-2017-7679 CVE-2017-9788 CVE-2017-9798 CVE-2018-1283 CVE-2018-1301 CVE-2018-1302 CVE-2018-1303 CVE-2018-1312 CVE-2018-17199 CVE-2019-0217 CVE-2019-0220 CVE-2019-10092 CVE-2019-10098 CVE-2019-17567 CVE-2020-11985 CVE-2020-13938 CVE-2020-1927 CVE-2020-1934 CVE-2020-35452 CVE-2021-26690 CVE-2021-26691 CVE-2021-34798 CVE-2021-39275 CVE-2021-40438 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23943 CVE-2022-26377 CVE-2022-28330 CVE-2022-28614 CVE-2022-28615 CVE-2022-29404 CVE-2022-30556 CVE-2022-31813 CVE-2022-36760 CVE-2022-37436 CVE-2023-25690

Map

Whois Information

  • inetnum: 176.113.115.0 - 176.113.115.255
  • netname: HK-CATTECHNOLOGIES
  • country: RU
  • org: ORG-CAT7-RIPE
  • sponsoring-org: ORG-IL432-RIPE
  • admin-c: CAT77-RIPE
  • tech-c: CAT77-RIPE
  • status: ASSIGNED PI
  • mnt-by: IP-RIPE
  • mnt-by: RIPE-NCC-END-MNT
  • created: 2023-02-22T13:34:31Z
  • last-modified: 2023-02-22T20:43:55Z
  • organisation: ORG-CAT7-RIPE
  • org-name: Cat Technologies Co. Limited
  • country: HK
  • address: 7/F, MW Tower, 111 Bonham Strand
  • address: Sheung Wan
  • address: Hong Kong
  • abuse-c: CAT77-RIPE
  • mnt-ref: IP-RIPE
  • mnt-by: IP-RIPE
  • org-type: OTHER
  • created: 2023-02-20T16:35:59Z
  • last-modified: 2023-02-22T13:34:31Z
  • role: Cat Technologies Co. Limited
  • nic-hdl: CAT77-RIPE
  • address: 7/F, MW Tower, 111 Bonham Strand
  • address: Sheung Wan
  • address: Hong Kong
  • abuse-mailbox: [email protected]
  • mnt-by: IP-RIPE
  • created: 2023-02-20T16:36:01Z
  • last-modified: 2023-06-16T17:00:59Z
  • route: 176.113.115.0/24
  • origin: AS57678
  • mnt-by: IP-RIPE
  • created: 2022-08-08T12:28:57Z
  • last-modified: 2023-02-22T20:44:05Z

Links to attack logs

anonymous-proxy-ip-list-2023-06-29