NetWork | ZeroBOX

Network Analysis

IP Address Status Action
103.124.173.35 Active Moloch
103.54.41.193 Active Moloch
103.66.72.217 Active Moloch
154.79.245.158 Active Moloch
172.217.25.14 Active Moloch
Name Response Post-Analysis Lookup
No hosts contacted.
GET 200 https://103.54.41.193/tot90/TEST22-PC_W617601.F773CB1B97BB6C3311087FB95D3B54AB/5/kps/
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
154.79.246.193 192.168.56.102 3
154.79.246.193 192.168.56.102 3
154.79.246.193 192.168.56.102 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49812 -> 103.54.41.193:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 103.54.41.193:443 -> 192.168.56.102:49812 2011540 ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) Not Suspicious Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49812
103.54.41.193:443
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd C=AU, ST=Some-State, O=Internet Widgits Pty Ltd bb:48:e9:a1:55:37:8d:d3:de:c1:26:8f:7a:43:8c:19:5e:bb:da:25

Snort Alerts

No Snort Alerts