Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 103.119.64.219Malicious

IP Address: 103.119.64.219Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Connect-Back, Scanner

Services Targeted

SMB

Tags

MSRPC Successful SMB Login Service Deletion Service Start CMD Service Creation SMB Null Session Login SMB

Associated Attack Servers

adsl-pool.sx.cn myrepublic.co.id

14.188.173.132 41.35.18.106 103.97.202.40 124.163.218.8 159.89.31.59 183.3.223.86

Basic Information

IP Address

103.119.64.219

Domain

-

ISP

MyRepublic ID

Country

Indonesia

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2021-03-18

Last seen in Akamai Guardicore Segmentation

2024-03-30

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using SMB with the following username: administrator - Authentication policy: Reached Max Attempts

Successful SMB Login

A user logged in using SMB with the following username: administrator - Authentication policy: Previously Approved User

Successful SMB Login

c:\windows\system32\services.exe installed and started cmd as a service named AC08 under service group None

Service Start Service Creation

A user logged in using SMB with the following username: administrator - Authentication policy: Previously Approved User 90 times

Successful SMB Login

c:\windows\system32\services.exe installed and started cmd as a service named AC09 under service group None

Service Start Service Creation

c:\windows\system32\services.exe installed cmd as a service named AC00 under service group None

Service Creation

c:\windows\system32\services.exe installed cmd as a service named AC07 under service group None

Service Creation

c:\windows\system32\services.exe installed and started cmd as a service named AC02 under service group None

Service Start Service Creation

c:\windows\system32\services.exe installed and started cmd as a service named AC03 under service group None

Service Start Service Creation

c:\windows\system32\services.exe installed cmd as a service named AC06 under service group None

Service Creation

c:\windows\system32\services.exe installed cmd as a service named AC04 under service group None

Service Creation

c:\windows\system32\services.exe installed cmd as a service named AC05 under service group None

Service Creation

c:\windows\system32\services.exe installed and started cmd as a service named AC01 under service group None

Service Start Service Creation

Connection was closed due to user inactivity