NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
23.21.128.92 Active Moloch
92.62.115.177 Active Moloch
GET 200 http://api.ipify.org/?format=xml
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.101 164.124.101.2 3
192.168.56.101 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 92.62.115.177:80 -> 192.168.56.101:49202 2031074 ET MALWARE Win32/Ficker Stealer Activity A Network Trojan was detected
TCP 92.62.115.177:80 -> 192.168.56.101:49201 2031074 ET MALWARE Win32/Ficker Stealer Activity A Network Trojan was detected
TCP 192.168.56.101:49201 -> 92.62.115.177:80 2031132 ET MALWARE Win32/Ficker Stealer Activity M3 A Network Trojan was detected
TCP 192.168.56.101:49202 -> 92.62.115.177:80 2031132 ET MALWARE Win32/Ficker Stealer Activity M3 A Network Trojan was detected
TCP 192.168.56.101:49197 -> 23.21.128.92:80 2029622 ET POLICY External IP Lookup (ipify .org) Potential Corporate Privacy Violation

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts