NetWork | ZeroBOX

Network Analysis

IP Address Status Action
172.217.25.14 Active Moloch
66.154.113.12 Active Moloch
Name Response Post-Analysis Lookup
No hosts contacted.

No traffic

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49813 -> 66.154.113.12:7707 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.102:49812 -> 66.154.113.12:7707 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 66.154.113.12:7707 -> 192.168.56.102:49812 2030673 ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) Domain Observed Used for C2 Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49812
66.154.113.12:7707
CN=AsyncRAT Server CN=AsyncRAT Server 2e:39:b5:04:b9:2a:60:f2:93:83:2a:54:b3:98:5b:2f:52:c4:3d:92
TLSv1
192.168.56.102:49813
66.154.113.12:7707
None None None

Snort Alerts

No Snort Alerts