NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
50.19.92.227 Active Moloch
95.213.179.67 Active Moloch
GET 200 http://api.ipify.org/?format=xml
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.103 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 95.213.179.67:80 -> 192.168.56.103:49163 2031074 ET MALWARE Win32/Ficker Stealer Activity A Network Trojan was detected
TCP 95.213.179.67:80 -> 192.168.56.103:49164 2031074 ET MALWARE Win32/Ficker Stealer Activity A Network Trojan was detected
TCP 192.168.56.103:49164 -> 95.213.179.67:80 2031132 ET MALWARE Win32/Ficker Stealer Activity M3 A Network Trojan was detected
TCP 192.168.56.103:49163 -> 95.213.179.67:80 2031132 ET MALWARE Win32/Ficker Stealer Activity M3 A Network Trojan was detected
TCP 192.168.56.103:49161 -> 50.19.92.227:80 2029622 ET POLICY External IP Lookup (ipify .org) Potential Corporate Privacy Violation

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts