Cyber Threat Intelligence

Discover malicious IPs and domains with Akamai Guardicore Segmentation

IP Address: 111.47.22.111Malicious

IP Address: 111.47.22.111Malicious

This IP address attempted an attack on a machine in our threat sensors network

Threat Information

Role

Attacker, Connect-Back, Scanner

Services Targeted

MSSQL SMB

Tags

System File Modification Outgoing Connection File Operation By CMD Service Configuration Service Stop MSSQL Brute Force Successful MSSQL Login MSSQL Service Start PowerShell Listening System Shutdown Download and Execute IDS - Attempted User Privilege Gain Post Reboot Rename CMD

Associated Attack Servers

121.201.35.88 121.in-addr.arpa 163data.com.cn 220.in-addr.arpa 60.in-addr.arpa airtelbroadband.in airtel.in ajato.com.br as270353.com.br asianet.co.in axntechnologies.in bracnet.net brasiltelecom.net.br cableplus.com.cn collabefood.com colocrossing.com ctm.net eastern-tele.com edu.hu gtdinternet.com gtntelecom.com.br hinet.net hwclouds-dns.com isplko.com jlccptt.net.cn krisent.com kubtel.ru milleni.com.tr nept.ru netsolir.com

1.248.75.8 2.38.36.112 2.66.87.38 2.90.254.183 5.43.243.154 5.150.64.46 5.202.190.172 8.142.71.135 8.242.233.44 14.161.36.184 14.166.216.226 14.171.134.236 14.172.168.24 14.181.205.216 14.190.76.6 14.240.37.209 14.240.247.249 14.242.128.250 14.249.72.224 14.250.145.100 23.27.116.86 23.94.61.165 23.94.203.148 23.234.247.86 27.5.79.216 27.68.156.195 27.72.88.76 27.76.112.100 27.79.144.196 27.123.1.138

Basic Information

IP Address

111.47.22.111

Domain

-

ISP

China Mobile Guangdong

Country

China

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Akamai Guardicore Segmentation

2021-06-05

Last seen in Akamai Guardicore Segmentation

2024-02-03

What is Akamai Guardicore Segmentation
Akamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

A user logged in using MSSQL with the following credentials: admin / ***** - Authentication policy: White List (Part of a Brute Force Attempt)

Successful MSSQL Login MSSQL Brute Force

Process c:\windows\system32\lsass.exe started listening on ports: 49158

A user logged in using MSSQL with the following credentials: admin / ***** - Authentication policy: Previously Approved User (Part of a Brute Force Attempt) 2 times

Successful MSSQL Login MSSQL Brute Force

IDS detected Attempted User Privilege Gain : SQL sp_configure - configuration change

IDS - Attempted User Privilege Gain

IDS detected Attempted User Privilege Gain : xp_cmdshell - program execution

IDS - Attempted User Privilege Gain

PowerShell session started by c:\windows\system32\windowspowershell\v1.0\powershell.exe 4 times

Process c:\windows\system32\windowspowershell\v1.0\powershell.exe generated outgoing network traffic to: 111.47.22.111:10521 2 times

Outgoing Connection

Service msiserver was started

Service Start

c:\windows\apppatch\acpsens.dll was deleted by c:\windows\system32\msiexec.exe ( pending reboot )

Post Reboot Rename

c:\windows\system32\sens.dll was deleted by c:\windows\system32\msiexec.exe ( pending reboot )

Post Reboot Rename

c:\windows\system32\sens.dll was renamed to c:\windows\apppatch\acpsens.dll by c:\windows\system32\msiexec.exe ( pending reboot )

Post Reboot Rename

c:\windows\setupact64.log was renamed to c:\windows\system32\sens.dll by c:\windows\system32\msiexec.exe ( pending reboot )

Post Reboot Rename

The file C:\Windows\Installer\MSI1CAC.tmp was downloaded and loaded by c:\windows\installer\msi1cac.tmp

Download and Execute

c:\windows\system32\msiexec.exe attempted shutdown of type Shut down the system and then restarted it, as well as any applications that have been registered for restart, Shut down the system and then restarted the system with reason: Unspecified

System Shutdown

The file C:\Windows\Installer\MSI1F11.tmp was downloaded and loaded by c:\windows\installer\msi1f11.tmp

Download and Execute

c:\windows\system32\wininit.exe attempted shutdown of type Shut down the system and then restarted the system, Shut down the system to a point at which it is safe to turn off the power with reason: Unspecified

System Shutdown

System file c:\windows\microsoft.net\framework64\v4.0.30319\config\security.config.cch was modified

System File Modification

System file c:\windows\microsoft.net\framework64\v4.0.30319\config\security.config.cch.1108.8718 was modified

System File Modification

System file c:\windows\microsoft.net\framework64\v4.0.30319\config\enterprisesec.config.cch.1108.8750 was modified

System File Modification

Service Dhcp was stopped

Service Stop

Service TermService was stopped

Service Stop

Service Wcmsvc was stopped

Service Stop

Connection was closed due to user inactivity

Associated Files

C:\Windows\Installer\MSI1E5A.tmp

SHA256: 6094c813ca4bd0c647b950ba286bd338ef3623fa953b3bcf1a359b88f7296e55

144896 bytes