NetWork | ZeroBOX

Network Analysis

IP Address Status Action
107.22.233.72 Active Moloch
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
185.66.15.228 Active Moloch
GET 200 http://api.ipify.org/?format=xml
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.102 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 185.66.15.228:80 -> 192.168.56.102:49809 2031074 ET MALWARE Win32/Ficker Stealer Activity A Network Trojan was detected
TCP 192.168.56.102:49809 -> 185.66.15.228:80 2031132 ET MALWARE Win32/Ficker Stealer Activity M3 A Network Trojan was detected
TCP 185.66.15.228:80 -> 192.168.56.102:49810 2031074 ET MALWARE Win32/Ficker Stealer Activity A Network Trojan was detected
TCP 192.168.56.102:49810 -> 185.66.15.228:80 2031132 ET MALWARE Win32/Ficker Stealer Activity M3 A Network Trojan was detected
TCP 192.168.56.102:49807 -> 107.22.233.72:80 2029622 ET POLICY External IP Lookup (ipify .org) Potential Corporate Privacy Violation

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts