NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
54.225.165.85 Active Moloch
92.62.115.177 Active Moloch
GET 200 http://api.ipify.org/?format=xml
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.102 164.124.101.2 3
192.168.56.102 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49806 -> 54.225.165.85:80 2029622 ET POLICY External IP Lookup (ipify .org) Potential Corporate Privacy Violation
TCP 92.62.115.177:80 -> 192.168.56.102:49812 2031074 ET MALWARE Win32/Ficker Stealer Activity A Network Trojan was detected
TCP 92.62.115.177:80 -> 192.168.56.102:49811 2031074 ET MALWARE Win32/Ficker Stealer Activity A Network Trojan was detected
TCP 192.168.56.102:49811 -> 92.62.115.177:80 2031132 ET MALWARE Win32/Ficker Stealer Activity M3 A Network Trojan was detected
TCP 192.168.56.102:49812 -> 92.62.115.177:80 2031132 ET MALWARE Win32/Ficker Stealer Activity M3 A Network Trojan was detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts