Initial check on VirusTotal, AbuseIPDB and Letsdefend Threat Intel show the source IP address flagged as Malicious.
Let’s move to the Log Management and check what kind of interaction this malicious IP had with our system.
Log Management shows 30 events coming from the external IP, filtering to the ones directed to the Matthew machine, we can confirm that the external IP aimed only this machine.
All of them are directed to the victim port 3389, used for RDP connections.
Look like that the user tried to connect using combination of different password and username in a matter of seconds.
All signals of an automated spraying password attack.
Out of 30 events we have
– 29 eventID 4625 – failed logind
– 1 eventID 4524
So eventually the attacker managed to access the victim machine, finding the user Matthew and guessing the password, probably too weak and inside the dictionary used for this attack.
In the terminal History tab se can immediately see sign of an discovery phase of an attack
EventID: 234 – [SOC176 – RDP Brute Force Detected]
EventID: 234
Brute Force
External
Malicious
YES
NO
YES
YES
218.92.0[.]56
Threat actor IP
Ip address
A brute-force RDP attack was launched from a malicious external IP (218.92.0[.]56, China – AS4134), targeting host Matthew (172.16.17.148). The attacker attempted multiple login attempts using common usernames (guest, admin, sysadmin, Matthew) and successfully authenticated using weak credentials. Post-compromise activity was observed via cmd.exe, including system and account enumeration — indicating early-stage post-exploitation.
Cybersecurity learner, log nerd, and TryHackMe badge hoarder. Let’s connect on LinkedIn before I get pulled into another packet capture.
Apparently we have to tell you this: yes, cookies are used. They're not edible, and no, you can't escape them — but you can pick what gets tracked. Yay for EU law!