Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
tttttt.me | 95.216.186.40 |
- UDP Requests
-
-
192.168.56.101:61479 164.124.101.2:53
-
192.168.56.101:62324 164.124.101.2:53
-
192.168.56.101:137 192.168.56.255:137
-
192.168.56.101:138 192.168.56.255:138
-
192.168.56.101:49152 239.255.255.250:3702
-
192.168.56.101:61480 239.255.255.250:3702
-
192.168.56.101:62327 239.255.255.250:1900
-
192.168.56.101:62329 239.255.255.250:3702
-
52.231.114.183:123 192.168.56.101:123
-
GET
200
https://tttttt.me/iot3redisium
REQUEST
RESPONSE
BODY
GET /iot3redisium HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: text/plain; charset=UTF-8
Host: tttttt.me
HTTP/1.1 200 OK
Server: nginx
Date: Thu, 10 Jun 2021 13:32:04 GMT
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: stel_ssid=db4e8b17b3962cdcae_3020865631318862366; expires=Fri, 11 Jun 2021 13:32:04 GMT; path=/; samesite=None; secure; HttpOnly
Pragma: no-cache
Cache-control: no-store
Strict-Transport-Security: max-age=35768000
Access-Control-Allow-Origin: *
POST
200
http://34.88.52.57/
REQUEST
RESPONSE
BODY
POST / HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: text/plain; charset=UTF-8
Content-Length: 128
Host: 34.88.52.57
HTTP/1.1 200 OK
Server: nginx
Date: Thu, 10 Jun 2021 13:32:05 GMT
Content-Type: text/plain;charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Access-Control-Allow-Headers: *
Access-Control-Allow-Origin: *
GET
200
http://34.88.52.57//l/f/QFsf9nkBuI_ccNKobbLR/8a72fa1b85384f18c5f548aecf7b1e808c6563c0
REQUEST
RESPONSE
BODY
GET //l/f/QFsf9nkBuI_ccNKobbLR/8a72fa1b85384f18c5f548aecf7b1e808c6563c0 HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Host: 34.88.52.57
HTTP/1.1 200 OK
Server: nginx
Date: Thu, 10 Jun 2021 13:32:06 GMT
Content-Type: application/octet-stream
Content-Length: 916735
Connection: keep-alive
Last-Modified: Thu, 11 Feb 2021 18:55:17 GMT
ETag: "60257d95-dfcff"
Accept-Ranges: bytes
GET
200
http://34.88.52.57//l/f/QFsf9nkBuI_ccNKobbLR/41f92516bf0b866e0fc7b1b1e142b3e5c8ea0747
REQUEST
RESPONSE
BODY
GET //l/f/QFsf9nkBuI_ccNKobbLR/41f92516bf0b866e0fc7b1b1e142b3e5c8ea0747 HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Host: 34.88.52.57
HTTP/1.1 200 OK
Server: nginx
Date: Thu, 10 Jun 2021 13:32:11 GMT
Content-Type: application/octet-stream
Content-Length: 2828315
Connection: keep-alive
Last-Modified: Thu, 11 Feb 2021 18:55:16 GMT
ETag: "60257d94-2b281b"
Accept-Ranges: bytes
POST
200
http://34.88.52.57/
REQUEST
RESPONSE
BODY
POST / HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: multipart/form-data, boundary=fQ2iY0qI4sL4iB1dG6aM1wQ5vV6a
Content-Length: 7723
Host: 34.88.52.57
HTTP/1.1 200 OK
Server: nginx
Date: Thu, 10 Jun 2021 13:32:17 GMT
Content-Type: text/plain;charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Access-Control-Allow-Headers: *
Access-Control-Allow-Origin: *
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49200 -> 95.216.186.40:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 34.88.52.57:80 -> 192.168.56.101:49203 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 34.88.52.57:80 -> 192.168.56.101:49203 | 2016538 | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download | Potentially Bad Traffic |
TCP 34.88.52.57:80 -> 192.168.56.101:49203 | 2021076 | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response | Potentially Bad Traffic |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49200 95.216.186.40:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=tttttt.me | ff:46:0a:ed:46:1a:92:da:d9:8a:95:d8:4b:c2:3d:51:b8:73:06:13 |
Snort Alerts
No Snort Alerts