NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.67.158.218 Active Moloch
195.201.225.248 Active Moloch
34.89.59.109 Active Moloch
GET 200 https://telete.in/hdmiprapor
REQUEST
RESPONSE
GET 200 https://aven93r.ru/uploads/sync.exe
REQUEST
RESPONSE
GET 200 https://aven93r.ru/uploads/procexp.exe
REQUEST
RESPONSE
GET 200 https://aven93r.ru/uploads/bit.exe
REQUEST
RESPONSE
POST 200 http://34.89.59.109/
REQUEST
RESPONSE
GET 200 http://34.89.59.109//l/f/jUEqXnkBuI_ccNKof1Lb/2c0e4a92a0d91cd2b863333fd026a43c7b0e00d6
REQUEST
RESPONSE
GET 200 http://34.89.59.109//l/f/jUEqXnkBuI_ccNKof1Lb/7896a8713169d4ef7152ec7f2f4c9ea6f1776723
REQUEST
RESPONSE
POST 200 http://34.89.59.109/
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.101 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 34.89.59.109:80 -> 192.168.56.101:49204 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 34.89.59.109:80 -> 192.168.56.101:49204 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 34.89.59.109:80 -> 192.168.56.101:49204 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49203 -> 195.201.225.248:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49282 -> 172.67.158.218:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49203
195.201.225.248:443
C=US, O=Let's Encrypt, CN=R3 CN=telecut.in 90:32:58:91:0c:ba:a4:df:b5:5b:14:a9:17:bf:d4:5a:c6:34:d6:c2
TLSv1
192.168.56.101:49282
172.67.158.218:443
C=US, O=Let's Encrypt, CN=R3 CN=*.aven93r.ru 1a:aa:3a:26:80:a9:b0:20:c0:10:13:3a:5c:fa:6f:58:41:ba:87:51

Snort Alerts

No Snort Alerts