NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
186.66.15.10 Active Moloch
186.97.172.178 Active Moloch
190.110.179.139 Active Moloch
27.72.107.215 Active Moloch
34.107.221.82 Active Moloch
GET 200 https://190.110.179.139/tot112/TEST22-PC_W617601.B83B71A0873C68B5D06BB278310EAB3F/5/kps/
REQUEST
RESPONSE
GET 200 https://27.72.107.215/tot112/TEST22-PC_W617601.B83B71A0873C68B5D06BB278310EAB3F/5/kps/
REQUEST
RESPONSE
GET 200 https://186.97.172.178/tot112/TEST22-PC_W617601.B83B71A0873C68B5D06BB278310EAB3F/5/kps/
REQUEST
RESPONSE
GET 200 https://186.97.172.178/tot112/TEST22-PC_W617601.B83B71A0873C68B5D06BB278310EAB3F/5/kps/
REQUEST
RESPONSE
GET 200 https://27.72.107.215/tot112/TEST22-PC_W617601.B83B71A0873C68B5D06BB278310EAB3F/5/kps/
REQUEST
RESPONSE
GET 200 http://detectportal.firefox.com/success.txt?ipv4
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49811 -> 190.110.179.139:443 2404311 ET CNC Feodo Tracker Reported CnC Server group 12 A Network Trojan was detected
TCP 192.168.56.102:49812 -> 27.72.107.215:443 2404316 ET CNC Feodo Tracker Reported CnC Server group 17 A Network Trojan was detected
TCP 192.168.56.102:49814 -> 186.66.15.10:443 2404310 ET CNC Feodo Tracker Reported CnC Server group 11 A Network Trojan was detected
TCP 192.168.56.102:49811 -> 190.110.179.139:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.102:49812 -> 27.72.107.215:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 190.110.179.139:443 -> 192.168.56.102:49811 2011540 ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) Not Suspicious Traffic
TCP 27.72.107.215:443 -> 192.168.56.102:49812 2011540 ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) Not Suspicious Traffic
TCP 192.168.56.102:49813 -> 186.97.172.178:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 186.97.172.178:443 -> 192.168.56.102:49813 2011540 ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) Not Suspicious Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49811
190.110.179.139:443
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd C=AU, ST=Some-State, O=Internet Widgits Pty Ltd a4:a1:81:06:c2:26:c0:b1:d3:f0:fe:7a:2c:ff:b4:d6:09:65:aa:e7
TLSv1
192.168.56.102:49812
27.72.107.215:443
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd C=AU, ST=Some-State, O=Internet Widgits Pty Ltd a4:a1:81:06:c2:26:c0:b1:d3:f0:fe:7a:2c:ff:b4:d6:09:65:aa:e7
TLSv1
192.168.56.102:49813
186.97.172.178:443
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd C=AU, ST=Some-State, O=Internet Widgits Pty Ltd 03:f9:52:49:c0:e2:62:9b:bf:52:1c:0d:34:ce:e9:25:49:fb:7e:cc

Snort Alerts

No Snort Alerts