IP Address: 200.58.75.221Malicious

Weekly Summary

Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network

Top Threats

Cyber Threat Intelligence

Discover Malicious IPs and Domains with Guardicore Cyber Threat Feed

IP Address:
200.58.75.221​
Malicious

This IP address attempted an attack on a machine protected by Guardicore Centra

Threat Information

Role

Attacker, Scanner

Services Targeted

MSSQL

Tags

MSSQL Successful MSSQL Login Successful SMB Login Service Deletion MSSQL Brute Force Download and Execute User Created Service Start Download File IDS - Attempted User Privilege Gain SMB Service Stop User Added to Group Execute MsSql Shell Command Service Creation CMD File Operation By CMD SMB Share Connect

Associated Attack Servers

v.beahh.com

Basic Information

IP Address

200.58.75.221

Domain

-

ISP

Comteco Ltda

Country

Bolivia, Plurinational State of

WHOIS

Created Date

-

Updated Date

-

Organization

-

First seen in Guardicore Centra

2018-03-12

Last seen in Guardicore Centra

2020-11-17

What is Guardicore Centra
Guardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More

Attack Flow

IDS detected Attempted User Privilege Gain : SQL sp_configure - configuration change

IDS - Attempted User Privilege Gain

IDS detected Attempted User Privilege Gain : sp_password - password change

IDS - Attempted User Privilege Gain

IDS detected Attempted User Privilege Gain : xp_cmdshell - program execution

IDS - Attempted User Privilege Gain

A user logged in using MSSQL with the following credentials: sa / ****** - Authentication policy: White List (Part of a Brute Force Attempt)

MSSQL Brute Force Successful MSSQL Login

A user logged in using MSSQL with the following credentials: sa / ****** - Authentication policy: Previously Approved User (Part of a Brute Force Attempt)

MSSQL Brute Force Successful MSSQL Login

MSSQL executed 1 shell commands

Execute MsSql Shell Command

User k8h3d was created with the password *********** added to groups: Administrators and logged in using SMB

Successful SMB Login User Created User Added to Group

A user logged in using SMB with the following username: k8h3d - Authentication policy: Correct Password

Successful SMB Login

c:\windows\system32\services.exe installed and started %systemroot%\aqkaixko.exe as a service named Ysow under service group None

Service Creation Service Start

The file C:\Windows\AqKaiXko.exe was downloaded and executed

Download and Execute

C:\Windows\temp\svchost.exe was downloaded

Download File

C:\Windows\temp\tmp.vbs was downloaded

Download File

Service Ysow was stopped

Service Stop

Connection was closed due to timeout

Associated Files

\\server-backup\c$\zilnbirc.exe

SHA256: 3c2fe308c0a563e06263bbacf793bbe9b2259d795fcc36b953793a7e499e7f71

56320 bytes

C:\Windows\temp\svchost.exe

SHA256: 0f86f8cc32c7e1d66d0d44301ce59d3c07fda647c14c6d53b65296db87deec33

6967054 bytes

C:\Windows\temp\svchost.exe

SHA256: cabe11aa661789a9dab7cfeb9b13d4885a949513ae4a59e4d71e7dce1b7a26a0

6967056 bytes

Oops! - Do you see your IP here? Contact us at labs@guardicore.com to remove it from the Threat Intelligence data.

IP Address: 200.58.75.221​Malicious