Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 112.83.253.162Previously Malicious

IP Address: 112.83.253.162Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Scanner

Services Targeted

MSSQL

Tags

Execute MsSql Shell Command MSSQL Outgoing Connection IDS - Attempted User Privilege Gain Successful MSSQL Login Bulk Files Tampering PowerShell CMD

Associated Attack Servers

1.202.222.115 45.32.134.122

Basic Information

IP Address

112.83.253.162

Domain

-

ISP

China Unicom Liaoning

Country

China

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2021-07-10

Last seen in Akamai Guardicore Segmentation

2021-07-10

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using MSSQL with the following credentials: sa / ******** - Authentication policy: White List

Successful MSSQL Login

A user logged in using MSSQL with the following credentials: sa / ******** - Authentication policy: Previously Approved User

Successful MSSQL Login

IDS detected Attempted User Privilege Gain : SQL sp_configure - configuration change

IDS - Attempted User Privilege Gain

IDS detected Attempted User Privilege Gain : xp_cmdshell - program execution

IDS - Attempted User Privilege Gain

IDS detected Attempted User Privilege Gain : xp_reg* - registry access

IDS - Attempted User Privilege Gain

IDS detected Attempted User Privilege Gain : sp_start_job - program execution

IDS - Attempted User Privilege Gain

A user logged in using MSSQL with the following credentials: sa / ******** - Authentication policy: Previously Approved User 2 times

Successful MSSQL Login

Process c:\windows\system32\windowspowershell\v1.0\powershell.exe generated outgoing network traffic to: 1.202.222.115:10974 3 times

Outgoing Connection

PowerShell session started by c:\windows\system32\windowspowershell\v1.0\powershell.exe 6 times

MSSQL executed 2 shell commands

Execute MsSql Shell Command

Process c:\windows\system32\windowspowershell\v1.0\powershell.exe generated outgoing network traffic to: 45.32.134.122:11605

Outgoing Connection

Process c:\windows\system32\windowspowershell\v1.0\powershell.exe generated outgoing network traffic to: 45.32.134.122:11605 2 times

Outgoing Connection

Connection was closed due to user inactivity

Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local\microsoft\windows\powershell\commandanalysis} on 53 files

Bulk Files Tampering