NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
185.163.45.63 Active Moloch
Name Response Post-Analysis Lookup
behr.ppinewsagency.live 185.163.45.63
OPTIONS 405 https://behr.ppinewsagency.live/5098/1/1069/2/0/0/0/m/files-3607001e/
REQUEST
RESPONSE
HEAD 405 https://behr.ppinewsagency.live/5098/1/1069/2/0/0/0/m/files-3607001e/file.rtf
REQUEST
RESPONSE
OPTIONS 405 https://behr.ppinewsagency.live/5098/1/1069/2/0/0/0/m/
REQUEST
RESPONSE
GET 404 https://behr.ppinewsagency.live/5098/1/1069/2/0/0/0/m/files-3607001e/file.rtf
REQUEST
RESPONSE
GET 404 https://behr.ppinewsagency.live/5098/1/1069/2/0/0/0/m/files-3607001e/file.rtf
REQUEST
RESPONSE
OPTIONS 405 https://behr.ppinewsagency.live/5098/1/1069/2/0/0/0/m/files-3607001e/
REQUEST
RESPONSE
HEAD 405 https://behr.ppinewsagency.live/5098/1/1069/2/0/0/0/m/files-3607001e/file.rtf
REQUEST
RESPONSE
GET 404 https://behr.ppinewsagency.live/5098/1/1069/2/0/0/0/m/files-3607001e/file.rtf
REQUEST
RESPONSE
GET 404 https://behr.ppinewsagency.live/5098/1/1069/2/0/0/0/m/files-3607001e/file.rtf
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49170 -> 185.163.45.63:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49168 -> 185.163.45.63:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49170
185.163.45.63:443
C=US, O=Let's Encrypt, CN=R3 CN=*.ppinewsagency.live 5f:a9:0f:b1:7a:0b:eb:b9:5c:49:77:31:c1:4f:66:4c:b5:81:b5:6e
TLSv1
192.168.56.103:49168
185.163.45.63:443
C=US, O=Let's Encrypt, CN=R3 CN=*.ppinewsagency.live 5f:a9:0f:b1:7a:0b:eb:b9:5c:49:77:31:c1:4f:66:4c:b5:81:b5:6e

Snort Alerts

No Snort Alerts