NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
194.61.0.8 Active Moloch
Name Response Post-Analysis Lookup
dll1221.eternalhost.info 194.61.0.8
GET 404 http://dll1221.eternalhost.info//cisCheckerstroke.php
REQUEST
RESPONSE
GET 500 http://dll1221.eternalhost.info//gate.php?hwid=7C6024AD&os=6.1.7601&av=
REQUEST
RESPONSE
GET 200 http://dll1221.eternalhost.info//loader.txt
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.101 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49206 -> 194.61.0.8:80 2022818 ET MALWARE Generic gate[.].php GET with minimal headers A Network Trojan was detected
TCP 192.168.56.101:49206 -> 194.61.0.8:80 2030802 ET HUNTING Suspicious GET To gate.php with no Referer Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts