NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
95.142.37.102 Active Moloch
POST 100 https://activityhike.com/core.php
REQUEST
RESPONSE
POST 100 https://activityhike.com/core.php
REQUEST
RESPONSE
POST 100 https://activityhike.com/core.php
REQUEST
RESPONSE
GET 404 https://activityhike.com/files/red28.exe
REQUEST
RESPONSE
POST 100 https://activityhike.com/core.php
REQUEST
RESPONSE
GET 301 http://activityhike.com/files/red28.exe
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49212 -> 95.142.37.102:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49212
95.142.37.102:443
C=US, O=Let's Encrypt, CN=R3 CN=activityhike.com d9:01:ff:be:cb:a6:56:e3:39:d0:f7:3c:c7:e7:6f:3f:31:76:43:01

Snort Alerts

No Snort Alerts