NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
34.117.59.81 Active Moloch
78.24.217.56 Active Moloch
62.109.1.30 Active Moloch
Name Response Post-Analysis Lookup
ipinfo.io 34.117.59.81
GET 200 http://78.24.217.56/on/predpochel/ostatsa/anonistom/CpuGameApiSqlflower.php?dbNrr8z7=RMLf1fFId1YoCVXIkRnMUFyTxLHSg92&t0=o6vU3sBRuP&aFzjGrLvpLY2sqXwle9=4LEtLz6tdSyDE&9cb2beefe30f08fd6b229bb65bdf14a5=cbe8ead4e58ebaeb2d1f8262e2b19694&847db2de527380cc6f80ef60ca65913d=QNjhTO4Q2NiJWMjRWO1IjYwIjM5ADNzQWMiVWNxUjNxIzMmJmY3QGO&dbNrr8z7=RMLf1fFId1YoCVXIkRnMUFyTxLHSg92&t0=o6vU3sBRuP&aFzjGrLvpLY2sqXwle9=4LEtLz6tdSyDE
REQUEST
RESPONSE
GET 200 http://78.24.217.56/on/predpochel/ostatsa/anonistom/CpuGameApiSqlflower.php?dbNrr8z7=RMLf1fFId1YoCVXIkRnMUFyTxLHSg92&t0=o6vU3sBRuP&aFzjGrLvpLY2sqXwle9=4LEtLz6tdSyDE&6620ba511bddaf7cd97a91f748a57ce0=AZmFTZkJDMyYjYlZDO5E2MmVTN3IWMmFjM2YWZiZmNxQWY3UmY0gDZyUzM5MjNyUjMyAjMwUzM&847db2de527380cc6f80ef60ca65913d=gZlVmYmFTOxU2N5EmMhZTZ0IDOihjY1ITY3gTO2ATOhRGOjNzY1UWN&3766d7ec164999b3250f09ca6d7b986c=d1nIxcDOxImMlNGNiJWMwcDZzIzYwMWYzIjNxEzYzcjMlZTOyY2NlRWO1IiOiIWNxUGO4EDNjhzN3ADMwYDMmhjN3EzMmVDM0cDZlFWOiwiI1AjZ1IzN0UDM3UWZ1gzY0IzY0UGM3IjZwYzMmVjZjRjZyE2NkhjM3IiOiADZlNGO2czY0QzMyUGZlBzM4ETOmlTYjVzMmFGNjJWMis3W
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49167 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.102:49167 -> 34.117.59.81:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49166 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.102:49166 -> 34.117.59.81:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 34.117.59.81:443 -> 192.168.56.102:49166 2025330 ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io) Device Retrieving External IP Address Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49166
34.117.59.81:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1D4 CN=ipinfo.io 2a:93:c5:f6:21:4b:14:40:41:d9:36:fe:ff:fe:65:37:17:1c:4e:b8
TLS 1.2
192.168.56.102:49167
34.117.59.81:443
None None None

Snort Alerts

No Snort Alerts