NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
43.255.241.176 Active Moloch
34.117.59.81 Active Moloch
Name Response Post-Analysis Lookup
www.ez-cheats.com 43.255.241.176
GET 200 https://www.ez-cheats.com/panel/topup_hwid.php?h=085ec62e9b2ec0ab976156f2008398da
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49166 -> 43.255.241.176:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49165 -> 43.255.241.176:1337 2013214 ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server Malware Command and Control Activity Detected
TCP 192.168.56.102:49165 -> 43.255.241.176:1337 2016922 ET MALWARE Backdoor family PCRat/Gh0st CnC traffic Malware Command and Control Activity Detected
TCP 192.168.56.102:49165 -> 43.255.241.176:1337 2021716 ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 Malware Command and Control Activity Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49166
43.255.241.176:443
C=US, O=Let's Encrypt, CN=R3 CN=ez-cheats.com d7:29:76:a4:3b:25:ce:d3:9c:c3:da:88:a9:58:5c:ce:f4:d8:09:81

Snort Alerts

No Snort Alerts