Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
netcbin.info | 185.225.19.137 |
- TCP Requests
- UDP Requests
-
-
192.168.56.101:61479 164.124.101.2:53
-
192.168.56.101:62324 164.124.101.2:53
-
192.168.56.101:137 192.168.56.255:137
-
192.168.56.101:138 192.168.56.255:138
-
192.168.56.101:49152 239.255.255.250:3702
-
192.168.56.101:62325 239.255.255.250:3702
-
192.168.56.101:62445 239.255.255.250:1900
-
192.168.56.101:62447 239.255.255.250:3702
-
52.231.114.183:123 192.168.56.101:123
-
GET
200
https://netcbin.info/August_lpIeHgg240.bin
REQUEST
RESPONSE
BODY
GET /August_lpIeHgg240.bin HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Host: netcbin.info
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx
Date: Thu, 12 Aug 2021 01:48:43 GMT
Content-Type: application/octet-stream
Content-Length: 469056
Connection: keep-alive
Keep-Alive: timeout=60
Last-Modified: Sun, 08 Aug 2021 14:54:45 GMT
ETag: "101ccf-72840-5c90d73052062"
Accept-Ranges: bytes
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49201 -> 185.225.19.137:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49201 185.225.19.137:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=netcbin.info | f8:ef:c3:29:e4:d9:fa:4c:a8:cb:c3:59:87:ba:69:5e:05:39:12:a5 |
Snort Alerts
No Snort Alerts