NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
208.68.37.17 Active Moloch
Name Response Post-Analysis Lookup
feedbackportal.download 208.68.37.17
OPTIONS 405 https://feedbackportal.download/ecm/ibm/3173379797/
REQUEST
RESPONSE
HEAD 405 https://feedbackportal.download/ecm/ibm/3173379797/converter.dot
REQUEST
RESPONSE
OPTIONS 405 https://feedbackportal.download/ecm/ibm/
REQUEST
RESPONSE
GET 200 https://feedbackportal.download/ecm/ibm/3173379797/converter.dot
REQUEST
RESPONSE
HEAD 405 https://feedbackportal.download/ecm/ibm/3173379797/converter.dot
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49163 -> 208.68.37.17:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49164 -> 208.68.37.17:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49163
208.68.37.17:443
C=US, O=Let's Encrypt, CN=R3 CN=feedbackportal.download 06:df:3a:ee:87:57:1a:5c:dd:52:57:25:39:48:a4:9c:18:58:13:b5
TLSv1
192.168.56.103:49164
208.68.37.17:443
C=US, O=Let's Encrypt, CN=R3 CN=feedbackportal.download 06:df:3a:ee:87:57:1a:5c:dd:52:57:25:39:48:a4:9c:18:58:13:b5

Snort Alerts

No Snort Alerts