NetWork | ZeroBOX

Network Analysis

IP Address Status Action
151.101.40.193 Active Moloch
164.124.101.2 Active Moloch
193.23.244.244 Active Moloch
Name Response Post-Analysis Lookup
i.imgur.com 151.101.52.193
HEAD 200 https://i.imgur.com/qOLD3Td.png
REQUEST
RESPONSE
GET 200 https://i.imgur.com/qOLD3Td.png
REQUEST
RESPONSE
GET 200 http://193.23.244.244/tor/status-vote/current/consensus
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 193.23.244.244:80 -> 192.168.56.101:49206 2522324 ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 325 Misc Attack
TCP 192.168.56.101:49202 -> 151.101.40.193:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49203 -> 151.101.40.193:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49206 -> 193.23.244.244:80 2028914 ET POLICY TOR Consensus Data Requested Potential Corporate Privacy Violation
TCP 192.168.56.101:49206 -> 193.23.244.244:80 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49202
151.101.40.193:443
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA C=US, ST=California, L=San Francisco, O=Imgur, Inc., CN=*.imgur.com f4:34:6e:0c:34:5f:9f:d4:b5:ef:1c:cf:a5:e9:c1:67:1b:65:2a:a7
TLSv1
192.168.56.101:49203
151.101.40.193:443
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA C=US, ST=California, L=San Francisco, O=Imgur, Inc., CN=*.imgur.com f4:34:6e:0c:34:5f:9f:d4:b5:ef:1c:cf:a5:e9:c1:67:1b:65:2a:a7

Snort Alerts

No Snort Alerts