Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
api.ipify.org | 50.16.216.118 | |
pospvisis.com | 95.213.179.67 |
GET
200
http://api.ipify.org/?format=xml
REQUEST
RESPONSE
BODY
GET /?format=xml HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
Host: api.ipify.org
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Cowboy
Connection: keep-alive
Content-Type: text/plain
Vary: Origin
Date: Fri, 16 Jul 2021 04:29:21 GMT
Content-Length: 15
Via: 1.1 vegur
ICMP traffic
Source | Destination | ICMP Type | Data |
---|---|---|---|
192.168.56.103 | 164.124.101.2 | 3 |
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 95.213.179.67:80 -> 192.168.56.103:49163 | 2031074 | ET MALWARE Win32/Ficker Stealer Activity | A Network Trojan was detected |
TCP 95.213.179.67:80 -> 192.168.56.103:49164 | 2031074 | ET MALWARE Win32/Ficker Stealer Activity | A Network Trojan was detected |
TCP 192.168.56.103:49164 -> 95.213.179.67:80 | 2031132 | ET MALWARE Win32/Ficker Stealer Activity M3 | A Network Trojan was detected |
TCP 192.168.56.103:49163 -> 95.213.179.67:80 | 2031132 | ET MALWARE Win32/Ficker Stealer Activity M3 | A Network Trojan was detected |
TCP 192.168.56.103:49161 -> 50.19.92.227:80 | 2029622 | ET POLICY External IP Lookup (ipify .org) | Potential Corporate Privacy Violation |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts