NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.21.221 Active Moloch
157.240.215.35 Active Moloch
162.0.210.44 Active Moloch
162.0.220.187 Active Moloch
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
172.217.31.132 Active Moloch
172.67.153.74 Active Moloch
192.243.59.20 Active Moloch
198.13.62.186 Active Moloch
198.54.116.159 Active Moloch
208.95.112.1 Active Moloch
216.58.220.110 Active Moloch
88.218.92.148 Active Moloch
88.99.66.31 Active Moloch

GET 200 https://www.facebook.com/
REQUEST
RESPONSE
POST 100 https://connectini.net/Series/SuperNitou.php
REQUEST
RESPONSE
GET 200 https://www.facebook.com/
REQUEST
RESPONSE
POST 100 https://connectini.net/Series/SuperNitou.php
REQUEST
RESPONSE
GET 200 https://iplogger.org/18hh57
REQUEST
RESPONSE
GET 200 https://iplogger.org/1twXf7
REQUEST
RESPONSE
POST 100 https://connectini.net/Series/Conumer4Publisher.php
REQUEST
RESPONSE
GET 200 https://connectini.net/Series/publisher/1/KR.json
REQUEST
RESPONSE
POST 100 https://connectini.net/Series/Conumer4Publisher.php
REQUEST
RESPONSE
GET 200 https://connectini.net/Series/publisher/1/KR.json
REQUEST
RESPONSE
POST 100 https://connectini.net/Series/Conumer2kenpachi.php
REQUEST
RESPONSE
POST 100 https://connectini.net/Series/Conumer2kenpachi.php
REQUEST
RESPONSE
GET 200 https://connectini.net/Series/kenpachi/2/goodchannel/KR.json
REQUEST
RESPONSE
GET 200 https://connectini.net/Series/kenpachi/2/goodchannel/KR.json
REQUEST
RESPONSE
GET 503 https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
REQUEST
RESPONSE
GET 200 https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
REQUEST
RESPONSE
GET 200 https://connectini.net/Series/configPoduct/2/goodchannel.json
REQUEST
RESPONSE
GET 200 https://connectini.net/Series/configPoduct/2/goodchannel.json
REQUEST
RESPONSE
GET 302 https://www.profitabletrustednetwork.com/e2q8zu9hu?shu=a3fd8c97f94682045df68f23d0d7cb483c31b50beafbd7b7c18313af024171672bd5b4321b284b2edd85dbf35f0bd1874d437548da11dedea0f8ed36232ca57e1149cad33c923a12e7b918b983a3dee49a284c&pst=1623489884&rmtc=t&uuid=&pii=true&in=false&key=a971bbe4a40a7216a1a87d8f455f71e6
REQUEST
RESPONSE
GET 200 https://www.profitabletrustednetwork.com/favicon.ico
REQUEST
RESPONSE
GET 200 http://ip-api.com/json/
REQUEST
RESPONSE
HEAD 200 http://cor-tips.com/After_math_Eminem/AdvertiserInstaller/PicturesLab/PicturesLab.exe
REQUEST
RESPONSE
GET 200 http://cor-tips.com/After_math_Eminem/AdvertiserInstaller/PicturesLab/PicturesLab.exe
REQUEST
RESPONSE
HEAD 200 http://cor-tips.com/After_math_Eminem/AdvertiserInstaller/I-Record/I-Record.exe
REQUEST
RESPONSE
GET 200 http://cor-tips.com/After_math_Eminem/AdvertiserInstaller/I-Record/I-Record.exe
REQUEST
RESPONSE
GET 200 http://ip-api.com/json/?fields=8198
REQUEST
RESPONSE
POST 200 http://iw.gamegame.info/report7.4.php
REQUEST
RESPONSE
GET 200 http://cor-tips.com/Widgets/Picture-Lab.exe
REQUEST
RESPONSE
GET 200 http://ip-api.com/json/?fields=8198
REQUEST
RESPONSE
POST 200 http://ol.gamegame.info/report7.4.php
REQUEST
RESPONSE
GET 200 http://ip-api.com/json/?fields=8198
REQUEST
RESPONSE
POST 200 http://iw.gamegame.info/report7.4.php
REQUEST
RESPONSE
GET 200 http://ip-api.com/json/?fields=8198
REQUEST
RESPONSE
POST 200 http://iw.gamegame.info/report7.4.php
REQUEST
RESPONSE
GET 200 http://ip-api.com/json/?fields=8198
REQUEST
RESPONSE
POST 200 http://iw.gamegame.info/report7.4.php
REQUEST
RESPONSE
GET 200 http://cor-tips.com/After_math_Eminem/publisher/pdE2wzU92JHyzWh4.exe
REQUEST
RESPONSE
GET 200 http://uyg5wye.2ihsfa.com/api/fbtime
REQUEST
RESPONSE
POST 200 http://uyg5wye.2ihsfa.com/api/?sid=352087&key=d8e65b8cd10d25f87c984cac621590bf
REQUEST
RESPONSE
GET 200 http://cor-tips.com/Widgets/i-record.exe
REQUEST
RESPONSE
GET 200 http://cor-tips.com/After_math_Eminem/publisher/pdE2wzU92JHyzWh4.exe
REQUEST
RESPONSE
GET 200 http://cor-tips.com/After_math_Eminem/kenpa/n3tVVEsJQycdn6Vk.exe
REQUEST
RESPONSE
GET 200 http://cor-tips.com/After_math_Eminem/KeyHandler/5Nh3dEML5qjDf83H.exe
REQUEST
RESPONSE
POST 100 http://reportyuwt4sbackv97qarke3.com/qhy7yf7uqefsrt4jubgb9wtaftr5j3/f7gdb4w25njs9btvrjx778dspzbppu
REQUEST
RESPONSE
GET 200 http://www.google.com/
REQUEST
RESPONSE
GET 200 http://cor-tips.com/After_math_Eminem/kenpa/n3tVVEsJQycdn6Vk.exe
REQUEST
RESPONSE
GET 200 http://cor-tips.com/After_math_Eminem/KeyHandler/5Nh3dEML5qjDf83H.exe
REQUEST
RESPONSE
POST 100 http://reportyuwt4sbackv97qarke3.com/qhy7yf7uqefsrt4jubgb9wtaftr5j3/f7gdb4w25njs9btvrjx778dspzbppu
REQUEST
RESPONSE
GET 200 http://www.google.com/
REQUEST
RESPONSE
POST 100 http://reportyuwt4sbackv97qarke3.com/qhy7yf7uqefsrt4jubgb9wtaftr5j3/f7gdb4w25njs9btvrjx778dspzbppu
REQUEST
RESPONSE
POST 100 http://reportyuwt4sbackv97qarke3.com/qhy7yf7uqefsrt4jubgb9wtaftr5j3/f7gdb4w25njs9btvrjx778dspzbppu
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.102 164.124.101.2 3
192.168.56.102 164.124.101.2 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 198.13.62.186 3
192.168.56.102 216.58.220.110 8 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
216.58.220.110 192.168.56.102 0 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
192.168.56.102 216.58.220.110 8 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
216.58.220.110 192.168.56.102 0 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49815 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 198.54.116.159:80 -> 192.168.56.102:49819 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.102:49828 -> 157.240.215.35:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.102:61999 -> 198.13.62.186:53 2014702 ET DNS Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set Potential Corporate Privacy Violation
TCP 198.54.116.159:80 -> 192.168.56.102:49820 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.102:49833 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 192.168.56.102:49833 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 192.168.56.102:49837 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49833 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 192.168.56.102:49833 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 192.168.56.102:49833 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 192.168.56.102:49832 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 198.54.116.159:80 -> 192.168.56.102:49836 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 198.54.116.159:80 -> 192.168.56.102:49836 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.102:49848 -> 88.99.66.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 198.54.116.159:80 -> 192.168.56.102:49836 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 198.54.116.159:80 -> 192.168.56.102:49847 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 198.54.116.159:80 -> 192.168.56.102:49847 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.102:49865 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49873 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49876 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49885 -> 192.243.59.20:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49898 -> 172.67.153.74:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49897 -> 172.67.153.74:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49886 -> 192.243.59.20:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 198.54.116.159:80 -> 192.168.56.102:49836 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.102:49869 -> 88.99.66.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49874 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49887 -> 192.243.59.20:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49828
157.240.215.35:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA C=US, ST=California, L=Menlo Park, O=Facebook, Inc., CN=*.facebook.com 64:6a:5b:69:8b:12:93:b5:d8:b2:20:d5:3f:4e:74:04:ca:ba:95:5e
TLSv1
192.168.56.102:49837
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf
TLSv1
192.168.56.102:49832
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf
TLSv1
192.168.56.102:49848
88.99.66.31:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.iplogger.org 55:1e:13:99:46:1c:67:40:a3:48:7f:38:0d:16:e7:51:f4:c4:43:cb
TLSv1
192.168.56.102:49865
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf
TLSv1
192.168.56.102:49873
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf
TLSv1
192.168.56.102:49876
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf
TLSv1
192.168.56.102:49885
192.243.59.20:443
C=US, O=Let's Encrypt, CN=R3 CN=profitabletrustednetwork.com 72:e9:ae:f3:00:8a:5b:24:cd:04:8c:15:0d:b3:ec:6a:6b:f9:59:d7
TLSv1
192.168.56.102:49898
172.67.153.74:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com e0:21:46:53:67:77:03:77:07:a4:48:0b:fb:11:63:a5:bd:3a:87:4b
TLSv1
192.168.56.102:49897
172.67.153.74:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com e0:21:46:53:67:77:03:77:07:a4:48:0b:fb:11:63:a5:bd:3a:87:4b
TLSv1
192.168.56.102:49886
192.243.59.20:443
C=US, O=Let's Encrypt, CN=R3 CN=profitabletrustednetwork.com 72:e9:ae:f3:00:8a:5b:24:cd:04:8c:15:0d:b3:ec:6a:6b:f9:59:d7
TLSv1
192.168.56.102:49869
88.99.66.31:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.iplogger.org 55:1e:13:99:46:1c:67:40:a3:48:7f:38:0d:16:e7:51:f4:c4:43:cb
TLSv1
192.168.56.102:49874
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf
TLSv1
192.168.56.102:49887
192.243.59.20:443
C=US, O=Let's Encrypt, CN=R3 CN=profitabletrustednetwork.com 72:e9:ae:f3:00:8a:5b:24:cd:04:8c:15:0d:b3:ec:6a:6b:f9:59:d7

Snort Alerts

No Snort Alerts