NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
3.232.205.82 Active Moloch
47.91.170.222 Active Moloch
POST 0 http://www.phk0.com/att3/
REQUEST
RESPONSE
GET 200 http://www.phk0.com/att3/?7nwlq86p=s6xHIXHwkbkuLkMEuQxW4dJ5qgMEdMcFcUb9+bif01noR916v29hb9QaAtQ7NLpH63SSbDD7&Ppd=Hb08qfEHozY8xx
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.101 164.124.101.2 3
192.168.56.101 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49210 -> 3.232.205.82:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49210 -> 3.232.205.82:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49210 -> 3.232.205.82:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
UDP 192.168.56.101:61479 -> 164.124.101.2:53 2026888 ET INFO DNS Query for Suspicious .icu Domain Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts