NetWork | ZeroBOX

Network Analysis

IP Address Status Action
151.101.196.209 Active Moloch
164.124.101.2 Active Moloch
185.199.108.154 Active Moloch
208.95.112.1 Active Moloch
46.183.221.118 Active Moloch
52.78.231.108 Active Moloch
GET 200 http://ip-api.com/json/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49164 -> 52.78.231.108:443 2028375 ET JA3 Hash - Possible Malware - Java Based RAT Unknown Traffic
TCP 192.168.56.102:49166 -> 151.101.196.209:443 2028375 ET JA3 Hash - Possible Malware - Java Based RAT Unknown Traffic
TCP 192.168.56.102:49167 -> 151.101.196.209:443 2028375 ET JA3 Hash - Possible Malware - Java Based RAT Unknown Traffic
TCP 192.168.56.102:49168 -> 185.199.108.154:443 2028375 ET JA3 Hash - Possible Malware - Java Based RAT Unknown Traffic
TCP 192.168.56.102:49165 -> 151.101.196.209:443 2028375 ET JA3 Hash - Possible Malware - Java Based RAT Unknown Traffic
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49175 -> 46.183.221.118:3232 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
UDP 192.168.56.102:51868 -> 164.124.101.2:53 2016778 ET DNS Query to a *.pw domain - Likely Hostile Potentially Bad Traffic
TCP 192.168.56.102:49184 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49164
52.78.231.108:443
C=US, O=DigiCert, Inc., CN=DigiCert High Assurance TLS Hybrid ECC SHA256 2020 CA1 C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=github.com 84:63:b3:a9:29:12:cc:fd:1d:31:47:05:98:9b:ec:13:99:37:d0:d7
TLS 1.2
192.168.56.102:49166
151.101.196.209:443
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA C=US, ST=Maryland, L=Fulton, O=Sonatype, Inc, CN=repo1.maven.org 74:54:1d:15:cf:77:9e:e8:00:c2:ea:0d:77:6e:d3:02:51:0f:15:dd
TLS 1.2
192.168.56.102:49167
151.101.196.209:443
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA C=US, ST=Maryland, L=Fulton, O=Sonatype, Inc, CN=repo1.maven.org 74:54:1d:15:cf:77:9e:e8:00:c2:ea:0d:77:6e:d3:02:51:0f:15:dd
TLS 1.2
192.168.56.102:49168
185.199.108.154:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=www.github.com 70:94:de:dd:e6:c4:69:48:3a:92:70:a1:48:56:78:2d:18:64:e0:b7
TLS 1.2
192.168.56.102:49165
151.101.196.209:443
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA C=US, ST=Maryland, L=Fulton, O=Sonatype, Inc, CN=repo1.maven.org 74:54:1d:15:cf:77:9e:e8:00:c2:ea:0d:77:6e:d3:02:51:0f:15:dd

Snort Alerts

No Snort Alerts