NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
185.176.43.98 Active Moloch
203.133.167.81 Active Moloch
GET 200 https://www.daum.net/favicon.ico
REQUEST
RESPONSE
POST 302 http://alyssalove.getenjoyment.net/0423/v.php?ki87ujhy=C:\Program%20Files%20(x86)&rdxvdw=C:\Program%20Files%20(x86)
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.102 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49809 -> 203.133.167.81:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49808 -> 185.176.43.98:80 2027117 ET HUNTING Suspicious POST with Common Windows Process Names - Possible Process List Exfiltration A Network Trojan was detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49809
203.133.167.81:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=Thawte TLS RSA CA G1 C=KR, ST=Jeju-do, L=Jeju-si, O=Kakao Corp., CN=*.daum.net 67:7d:a8:dd:b7:e1:47:25:d5:d9:6c:3f:3c:e1:5b:43:0b:80:8b:69

Snort Alerts

No Snort Alerts