NetWork | ZeroBOX

Network Analysis

IP Address Status Action
160.121.199.48 Active Moloch
164.124.101.2 Active Moloch
64.190.62.111 Active Moloch
GET 404 http://www.drraass.com/d6b4/?BZR8DR=ZFjiT42y6P0728e7zdpBA4KxoCmBCCb5Al/LhO89P4sgCaouJTXqFiYZc9VykBwhS3eZep96&VRKt=vBZhY2d0ZnJDbt
REQUEST
RESPONSE
GET 0 http://www.5gusaphones.com/d6b4/?BZR8DR=TVsDFMPATNjElIxDQdFdIJ7pI7RNJco0RSJv47bENHhP3SgsFs3eKGTcOpqZrd+87WRONrAg&VRKt=vBZhY2d0ZnJDbt
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49165 -> 64.190.62.111:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49165 -> 64.190.62.111:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49165 -> 64.190.62.111:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 160.121.199.48:80 -> 192.168.56.102:49164 2400016 ET DROP Spamhaus DROP Listed Traffic Inbound group 17 Misc Attack
TCP 192.168.56.102:49164 -> 160.121.199.48:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49164 -> 160.121.199.48:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49164 -> 160.121.199.48:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts