IP Address: 124.70.146.235Previously Malicious
IP Address: 124.70.146.235Previously Malicious
This IP address attempted an attack on a machine in our threat sensors network
Role |
Attacker, Scanner |
Services Targeted |
MSSQL |
Tags |
Successful MSSQL Login Download and Execute Create MsSql Procedure Access Suspicious Domain File Operation By CMD MSSQL Brute Force Outgoing Connection Execute MsSql Shell Command CMD MSSQL DNS Query |
Associated Attack Servers |
IP Address |
124.70.146.235 |
|
Domain |
- |
|
ISP |
- |
|
Country |
China |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Akamai Guardicore Segmentation |
2022-12-23 |
Last seen in Akamai Guardicore Segmentation |
2022-12-27 |
What is Akamai Guardicore SegmentationAkamai Guardicore Segmentation is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Akamai Guardicore Segmentation generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using MSSQL with the following username: sa - Authentication policy: Reached Max Attempts (Part of a Brute Force Attempt) |
MSSQL Brute Force Successful MSSQL Login |
A user logged in using MSSQL with the following username: sa - Authentication policy: Previously Approved User (Part of a Brute Force Attempt) |
MSSQL Brute Force Successful MSSQL Login |
A user logged in using MSSQL with the following username: sa - Authentication policy: Previously Approved User (Part of a Brute Force Attempt) 4 times |
MSSQL Brute Force Successful MSSQL Login |
A user logged in using MSSQL with the following credentials: wwo / ******************* - Authentication policy: Reached Max Attempts (Part of a Brute Force Attempt) |
MSSQL Brute Force Successful MSSQL Login |
A user logged in using MSSQL with the following credentials: su / ******************* - Authentication policy: Reached Max Attempts (Part of a Brute Force Attempt) |
MSSQL Brute Force Successful MSSQL Login |
A user logged in using MSSQL with the following credentials: wwo / ******************* - Authentication policy: Previously Approved User (Part of a Brute Force Attempt) 2 times |
MSSQL Brute Force Successful MSSQL Login |
A user logged in using MSSQL with the following credentials: su / ******************* - Authentication policy: Previously Approved User (Part of a Brute Force Attempt) 2 times |
MSSQL Brute Force Successful MSSQL Login |
MSSQL procedures were created: sp_addextendedproc and sp_dropextendedproc |
Create MsSql Procedure |
Process c:\windows\system32\ftp.exe attempted to access suspicious domains: cct119.com 3 times |
DNS Query Access Suspicious Domain Outgoing Connection |
Process c:\windows\system32\ftp.exe generated outgoing network traffic to: 154.221.149.161:21 3 times |
Outgoing Connection |
MSSQL executed 47 shell commands |
Execute MsSql Shell Command |
Process c:\windows\system32\ftp.exe attempted to access suspicious domains: holl.f3322.net 6 times |
DNS Query Access Suspicious Domain Outgoing Connection |
Process c:\windows\system32\ftp.exe generated outgoing network traffic to: 42.194.217.252:21 6 times |
Outgoing Connection |
A user logged in using MSSQL with the following credentials: wwo / ******************* - Authentication policy: Previously Approved User (Part of a Brute Force Attempt) |
MSSQL Brute Force Successful MSSQL Login |
A user logged in using MSSQL with the following credentials: su / ******************* - Authentication policy: Previously Approved User (Part of a Brute Force Attempt) |
MSSQL Brute Force Successful MSSQL Login |
The file C:\Windows\System32\cs.exe was downloaded and executed |
Download and Execute |
Connection was closed due to timeout |
|