NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
185.234.247.75 Active Moloch
195.201.225.248 Active Moloch
Name Response Post-Analysis Lookup
telete.in 195.201.225.248
GET 200 https://telete.in/uidesopencardtop
REQUEST
RESPONSE
POST 200 http://185.234.247.75/
REQUEST
RESPONSE
GET 200 http://185.234.247.75//l/f/eAYt9XoBagrSXdgRtW3j/147c164f57246ff52d187892d033ff5af5d2df92
REQUEST
RESPONSE
GET 200 http://185.234.247.75//l/f/eAYt9XoBagrSXdgRtW3j/e9bed5f88e62036906900574f1e28599a7f8d5d3
REQUEST
RESPONSE
POST 200 http://185.234.247.75/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49203 -> 195.201.225.248:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 185.234.247.75:80 -> 192.168.56.101:49204 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.234.247.75:80 -> 192.168.56.101:49204 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.234.247.75:80 -> 192.168.56.101:49204 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49203
195.201.225.248:443
C=US, O=Let's Encrypt, CN=R3 CN=telecut.in 1d:7b:94:0d:d6:f9:85:f3:66:74:d5:1d:98:0c:7a:28:5b:c0:62:44

Snort Alerts

No Snort Alerts