NetWork | ZeroBOX

Network Analysis

IP Address Status Action
117.18.237.29 Active Moloch
162.159.129.233 Active Moloch
162.159.130.233 Active Moloch
164.124.101.2 Active Moloch
172.67.75.172 Active Moloch
45.137.190.166 Active Moloch
95.217.159.87 Active Moloch
GET 200 https://api.ip.sb/geoip
REQUEST
RESPONSE
GET 200 https://cdn.discordapp.com/attachments/868908533897363470/870626065511501945/welldone.exe
REQUEST
RESPONSE
GET 200 https://cdn.discordapp.com/attachments/868908533897363470/870626071547097128/clo.exe
REQUEST
RESPONSE
GET 200 http://45.137.190.166/mine.exe
REQUEST
RESPONSE
GET 200 http://45.137.190.166/clip.exe
REQUEST
RESPONSE
GET 200 http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
REQUEST
RESPONSE
GET 200 http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49163 -> 172.67.75.172:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49172 -> 45.137.190.166:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 45.137.190.166:80 -> 192.168.56.102:49172 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 45.137.190.166:80 -> 192.168.56.102:49172 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 45.137.190.166:80 -> 192.168.56.102:49172 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.102:49172 -> 45.137.190.166:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 95.217.159.87:4348 -> 192.168.56.102:49161 2221010 SURICATA HTTP unable to match response to request Generic Protocol Command Decode
TCP 45.137.190.166:80 -> 192.168.56.102:49172 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 45.137.190.166:80 -> 192.168.56.102:49172 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 95.217.159.87:4348 -> 192.168.56.102:49161 2221010 SURICATA HTTP unable to match response to request Generic Protocol Command Decode
TCP 95.217.159.87:4348 -> 192.168.56.102:49161 2221010 SURICATA HTTP unable to match response to request Generic Protocol Command Decode

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49163
172.67.75.172:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 5e:7d:19:2d:d7:66:0c:63:45:a5:24:8f:b7:db:35:a7:61:6d:89:0e
TLS 1.2
192.168.56.102:49190
162.159.130.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 54:e1:a7:9d:cc:c8:60:86:f1:a5:da:74:0e:5a:ab:45:df:37:8a:78
TLS 1.2
192.168.56.102:49189
162.159.129.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 54:e1:a7:9d:cc:c8:60:86:f1:a5:da:74:0e:5a:ab:45:df:37:8a:78

Snort Alerts

No Snort Alerts