NetWork | ZeroBOX

Network Analysis

IP Address Status Action
142.250.199.67 Active Moloch
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
205.185.120.57 Active Moloch
211.114.66.77 Active Moloch
POST 200 https://update.googleapis.com/service/update2?cup2key=10:14166197&cup2hreq=20c1416b2a2f82aac11ca40fe5c42a5b84b2cf5a3833cc39ca852275cd0d3e53
REQUEST
RESPONSE
POST 200 http://205.185.120.57/6.jpg
REQUEST
RESPONSE
POST 200 http://205.185.120.57/1.jpg
REQUEST
RESPONSE
POST 200 http://205.185.120.57/2.jpg
REQUEST
RESPONSE
POST 200 http://205.185.120.57/3.jpg
REQUEST
RESPONSE
POST 200 http://205.185.120.57/4.jpg
REQUEST
RESPONSE
POST 200 http://205.185.120.57/5.jpg
REQUEST
RESPONSE
POST 200 http://205.185.120.57/7.jpg
REQUEST
RESPONSE
POST 200 http://205.185.120.57/main.php
REQUEST
RESPONSE
POST 200 http://205.185.120.57/
REQUEST
RESPONSE
HEAD 302 http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
REQUEST
RESPONSE
HEAD 200 http://r2---sn-3u-bh2z7.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=175.208.134.150&mm=28&mn=sn-3u-bh2z7&ms=nvh&mt=1619702178&mv=m&mvi=2&pl=18&shardbypass=yes
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49812 -> 205.185.120.57:80 2010067 ET POLICY Data POST to an image file (jpg) A Network Trojan was detected
TCP 205.185.120.57:80 -> 192.168.56.102:49812 2026537 ET HUNTING Suspicious EXE Download Content-Type image/jpeg Potential Corporate Privacy Violation
TCP 205.185.120.57:80 -> 192.168.56.102:49812 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.102:49812 -> 205.185.120.57:80 2010067 ET POLICY Data POST to an image file (jpg) A Network Trojan was detected
TCP 205.185.120.57:80 -> 192.168.56.102:49812 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.102:49837 -> 172.217.26.131:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49812 -> 205.185.120.57:80 2010067 ET POLICY Data POST to an image file (jpg) A Network Trojan was detected
TCP 205.185.120.57:80 -> 192.168.56.102:49812 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.102:49812 -> 205.185.120.57:80 2010067 ET POLICY Data POST to an image file (jpg) A Network Trojan was detected
TCP 192.168.56.102:49812 -> 205.185.120.57:80 2010067 ET POLICY Data POST to an image file (jpg) A Network Trojan was detected
TCP 192.168.56.102:49812 -> 205.185.120.57:80 2010067 ET POLICY Data POST to an image file (jpg) A Network Trojan was detected
TCP 192.168.56.102:49812 -> 205.185.120.57:80 2010067 ET POLICY Data POST to an image file (jpg) A Network Trojan was detected
TCP 192.168.56.102:49812 -> 205.185.120.57:80 2029236 ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil Malware Command and Control Activity Detected
TCP 192.168.56.102:49812 -> 205.185.120.57:80 2029846 ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) A Network Trojan was detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49837
172.217.26.131:443
C=US, O=Google Trust Services, CN=GTS CA 1O1 C=US, ST=California, L=Mountain View, O=Google LLC, CN=upload.video.google.com c2:b5:f0:1b:46:55:3f:d3:65:b2:1d:5c:cc:56:a7:41:ac:9c:7a:22

Snort Alerts

No Snort Alerts