NetWork | ZeroBOX

Network Analysis

IP Address Status Action
107.180.58.44 Active Moloch
108.167.181.248 Active Moloch
148.66.138.194 Active Moloch
164.124.101.2 Active Moloch
173.230.252.50 Active Moloch
192.185.16.122 Active Moloch
192.185.32.234 Active Moloch
192.185.79.55 Active Moloch
208.91.198.106 Active Moloch
209.188.15.214 Active Moloch
23.212.13.232 Active Moloch
23.40.44.112 Active Moloch
35.155.6.125 Active Moloch
83.150.213.154 Active Moloch

GET 302 http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=0.0.0.0&asdelta=0.0.0.0&prod=925A3ACA-C353-458A-AC8D-A7E5EB378092
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49593 -> 23.212.13.232:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49591 -> 35.155.6.125:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49594 -> 23.40.44.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.185.16.122:443 -> 192.168.56.103:49603 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49601 -> 192.185.16.122:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49605 -> 107.180.58.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49610 -> 209.188.15.214:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49602 -> 192.185.16.122:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 209.188.15.214:443 -> 192.168.56.103:49611 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49613 -> 192.185.79.55:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 107.180.58.44:443 -> 192.168.56.103:49607 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.185.79.55:443 -> 192.168.56.103:49615 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49617 -> 192.185.32.234:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49618 -> 192.185.32.234:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49623 -> 208.91.198.106:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49609 -> 209.188.15.214:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 208.91.198.106:443 -> 192.168.56.103:49624 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49621 -> 208.91.198.106:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49626 -> 148.66.138.194:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49631 -> 173.230.252.50:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49627 -> 148.66.138.194:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 148.66.138.194:443 -> 192.168.56.103:49628 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49636 -> 83.150.213.154:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49636 -> 83.150.213.154:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 83.150.213.154:443 -> 192.168.56.103:49636 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49638 -> 108.167.181.248:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 83.150.213.154:443 -> 192.168.56.103:49636 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49639 -> 108.167.181.248:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 108.167.181.248:443 -> 192.168.56.103:49640 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49606 -> 107.180.58.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 173.230.252.50:443 -> 192.168.56.103:49632 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49635 -> 83.150.213.154:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49635 -> 83.150.213.154:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49635 -> 83.150.213.154:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49614 -> 192.185.79.55:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.185.32.234:443 -> 192.168.56.103:49619 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49630 -> 173.230.252.50:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49634 -> 83.150.213.154:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49634 -> 83.150.213.154:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49634 -> 83.150.213.154:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 83.150.213.154:443 -> 192.168.56.103:49634 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 83.150.213.154:443 -> 192.168.56.103:49634 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 83.150.213.154:443 -> 192.168.56.103:49635 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 83.150.213.154:443 -> 192.168.56.103:49635 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49591
35.155.6.125:443
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA C=US, ST=California, L=Mountain View, O=Mozilla Corporation, OU=Cloud Services, CN=*.telemetry.mozilla.org 6d:3c:6a:a4:5f:46:eb:8b:b6:fb:8f:08:44:02:01:61:a0:25:c3:c8
TLSv1
192.168.56.103:49594
23.40.44.112:443
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 02 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, OU=Microsoft Corporation, CN=download.microsoft.com e7:01:d1:e2:a1:0e:a1:84:0b:d0:c6:2e:a2:42:7a:f4:7b:40:91:c5
TLSv1
192.168.56.103:49593
23.212.13.232:443
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, OU=Microsoft Corporation, CN=www.microsoft.com 9b:2b:8a:e6:51:69:aa:47:7c:57:83:d6:48:0f:29:6e:f4:8c:f1:4d

Snort Alerts

No Snort Alerts