Observed Activity: Network Communication from Indonesian IP Address
Executive Summary
- SGI observed network communication originating from IP address 103.179.27.93, associated with AS149333 (PT Primadona Media Digitalindo) in Indonesia.
- The observed activity involved a file identified by SHA256 hash 01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b.
- VirusTotal analysis of the file indicates a low maliciousness score, but a high number of undetected statuses, suggesting potential obscurity.
- The likely objective is reconnaissance or initial access, with the possibility of delivering malicious content or exploiting vulnerabilities.
- Business risk is currently assessed as low, but requires monitoring due to the unknown nature of the file.
Organizations should implement network monitoring and endpoint detection rules to identify and block similar traffic patterns.
Observed Activity (SGI Sensors)
| ObservedAt | SensorName | SourceIP | SourceASN | SourceGeo | Protocol/Port | PayloadPresence | Hash |
|---|---|---|---|---|---|---|---|
| 2025-10-26T08:37:46.241Z | 103.179.27.XXX | AS149333 | ID | tcp/ | Yes | 01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b |
On October 26, 2025, at 08:37:46 UTC, an SGI sensor detected network communication from IP address 103.179.27.93, originating from Samarinda, East Kalimantan, Indonesia. The source ASN is AS149333, registered to PT Primadona Media Digitalindo. A payload was present, and the SHA256 hash of the payload is 01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b. Further investigation is needed to understand the complete nature of the network traffic.
Malware/Technique Overview
The observed file is identified as standalone-framework.js. While classified as low severity, JavaScript files can be used for a variety of malicious purposes, including:
- Webpage Redirection: Redirecting users to phishing sites or malicious download locations.
- Information Stealing: Collecting user data like cookies, browsing history, or form data.
- Remote Code Execution: If vulnerabilities exist, JavaScript can be used to execute arbitrary code on the user’s machine.
Given the lack of specific TTPs, a broad mapping is provided:
- T1204 – User Execution
- T1059 – Command and Scripting Interpreter
- T1189 – Drive-by Compromise
VirusTotal Snapshot
VirusTotal analysis shows:
- Malicious detections: 0
- Undetected: 58
- Harmless: 0
The lack of malicious detections despite a high number of undetected results suggests the file may be obfuscated, newly created, or designed to evade common detection methods. It is associated with several aliases including “plugin.js”, and “config.js”.
Indicators of Compromise (IoCs)
| Type | Value | Confidence | FirstSeen | Notes |
|---|---|---|---|---|
| IP | 103.179.27.XXX | Medium | 2025-10-26T08:37:46.241Z | AS149333 PT Primadona Media Digitalindo |
| Hash | 01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b | High | 2025-10-26T08:37:46.241Z | SHA256 from VirusTotal |
It is recommended to monitor these IoCs for at least 30 days.
Detection & Hunting
Splunk SPL
index=* sourcetype=proxy OR sourcetype=web_access "103.179.27.93"
| stats count by dest_ip, url, user
This query searches for connections to or from the identified IP address. Review the results for unusual patterns or destinations. False positives may include legitimate business services hosted in that region.
Elastic/Kibana KQL
(source.ip : "103.179.27.93") or (destination.ip : "103.179.27.93")
This query searches for network traffic involving the identified IP address.
Containment, Eradication & Recovery
- Isolate Affected Systems: Disconnect any systems that communicated with the identified IP address from the network to prevent further potential compromise.
- Block the IP Address: Add the IP address (103.179.27.93) to your firewall blocklist to prevent further communication.
- Scan Systems: Perform a full system scan on potentially affected endpoints using updated antivirus and anti-malware solutions.
- Credential Reset: If compromise is suspected, reset passwords for user accounts that may have been exposed.
Remember to inform the IT and leadership teams about the incident. Preserve any relevant logs and artifacts for forensic analysis.
Hardening & Preventive Controls
- Implement Multi-Factor Authentication (MFA): (NIST CSF: PR.AC-1, CIS Control 6) Enforce MFA for all users, especially those with privileged access.
- Tune Endpoint Detection and Response (EDR) Solutions: (NIST CSF: DE.CM-1, CIS Control 10) Configure EDR solutions to detect and block malicious JavaScript execution.
- Network Segmentation: (NIST CSF: PR.AC-5, CIS Control 14) Segment the network to limit the impact of potential breaches.
- Principle of Least Privilege: (NIST CSF: PR.AC-3, CIS Control 5) Grant users only the minimum necessary privileges.
- Patch Management: (NIST CSF: PR.MA-1, CIS Control 7) Maintain a rigorous patch management schedule to address known vulnerabilities.
Business Impact & Risk Outlook
The business impact is currently considered low, but potential risks include:
- Operational Disruption: If the JavaScript file delivers malicious code, it could disrupt business operations.
- Reputational Damage: A successful attack could damage the organization’s reputation.
Over the next 3-6 months, we anticipate an increase in obfuscated JavaScript-based attacks targeting vulnerabilities in web applications and browsers.
Appendix
Assumptions & Data Gaps:
- The full payload of the network communication was not captured.
- The specific application or service targeted by the communication is unknown.
- Complete network logs and endpoint telemetry are not available for a broader investigation.
References:
Stay ahead of emerging threats with Sentry Global Intelligence & Consulting Group. Our expert team provides comprehensive threat intelligence and actionable security solutions. Request an Incident Readiness Review today to assess your organization’s security posture. Benefit from 24/7 Monitoring with Sentry365™, ensuring continuous protection against evolving threats. For strategic security guidance, consider our vCISO Advisory services.