Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 61.37.59.249Previously Malicious

IP Address: 61.37.59.249Previously Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Scanner

Services Targeted

MSSQL

Tags

Execute MsSql Shell Command MSSQL File Operation By CMD Outgoing Connection IDS - Attempted User Privilege Gain Successful MSSQL Login Bulk Files Tampering PowerShell CMD

Associated Attack Servers

36.153.114.246 120.192.114.93

Basic Information

IP Address

61.37.59.249

Domain

-

ISP

LG DACOM Corporation

Country

Korea, Republic of

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2021-05-21

Last seen in Akamai Guardicore Segmentation

2021-05-29

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using MSSQL with the following credentials: sa / ****** - Authentication policy: White List

Successful MSSQL Login

A user logged in using MSSQL with the following credentials: sa / ****** - Authentication policy: Previously Approved User 3 times

Successful MSSQL Login

IDS detected Attempted User Privilege Gain : SQL sp_configure - configuration change

IDS - Attempted User Privilege Gain

IDS detected Attempted User Privilege Gain : xp_cmdshell - program execution

IDS - Attempted User Privilege Gain

IDS detected Attempted User Privilege Gain : xp_reg* - registry access

IDS - Attempted User Privilege Gain

IDS detected Attempted User Privilege Gain : sp_start_job - program execution

IDS - Attempted User Privilege Gain

Process c:\windows\system32\windowspowershell\v1.0\powershell.exe generated outgoing network traffic to: 120.192.114.93:18952 3 times

Outgoing Connection

PowerShell session started by c:\windows\system32\windowspowershell\v1.0\powershell.exe 6 times

MSSQL executed 2 shell commands

Execute MsSql Shell Command

Process c:\windows\system32\windowspowershell\v1.0\powershell.exe generated outgoing network traffic to: 36.153.114.246:17881 3 times

Outgoing Connection

Connection was closed due to user inactivity

Process c:\windows\system32\windowspowershell\v1.0\powershell.exe performed bulk changes in {c:\users\administrator\appdata\local\microsoft\windows\powershell\commandanalysis} on 53 files

Bulk Files Tampering