Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
antimalwarebyte.xyz | 185.22.155.64 |
POST
200
http://antimalwarebyte.xyz/collect.php
REQUEST
RESPONSE
BODY
POST /collect.php HTTP/1.1
Content-Type: multipart/form-data; boundary=SendFileZIPBoundary
User-Agent: uploader
Host: antimalwarebyte.xyz
Content-Length: 34753
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Connection: Keep-Alive
Keep-Alive: timeout=5, max=100
content-type: text/html; charset=UTF-8
content-length: 0
date: Fri, 02 Jul 2021 09:33:00 GMT
server: LiteSpeed
vary: User-Agent
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49321 -> 185.22.155.64:80 | 2027108 | ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts