NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
185.150.189.217 Active Moloch
Name Response Post-Analysis Lookup
main.bgsr.site 185.150.189.217
GET 200 https://main.bgsr.site/wp-includes/sodium_compat/src/Core32/ChaCha20/d68Tou3ui1RoUA.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49203 -> 185.150.189.217:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49203
185.150.189.217:443
C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority CN=main.bgsr.site 5f:03:9a:50:bb:86:53:1d:e3:87:ba:c4:d7:ef:39:26:fe:d2:2d:c0

Snort Alerts

No Snort Alerts