NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.80.70 Active Moloch
104.26.12.31 Active Moloch
161.156.67.100 Active Moloch
164.124.101.2 Active Moloch
172.67.218.85 Active Moloch
185.188.32.21 Active Moloch
188.172.201.158 Active Moloch
45.138.72.167 Active Moloch
GET 200 https://api.ip.sb/geoip
REQUEST
RESPONSE
GET 200 https://api.ip.sb/geoip
REQUEST
RESPONSE
GET 200 http://bingoroll15.net/update.php?id=315021678&stat=91e2f106dc042be7fe29ceda1c1236d8
REQUEST
RESPONSE
GET 200 http://bingoroll15.net/update.php?id=315021678&stat=91e2f106dc042be7fe29ceda1c1236d8
REQUEST
RESPONSE
GET 200 http://bingoroll6.net/me.exe
REQUEST
RESPONSE
GET 200 http://bingoroll15.net/update.php?id=315021678&stat=91e2f106dc042be7fe29ceda1c1236d8&cmd=1
REQUEST
RESPONSE
GET 200 http://bingoroll15.net/update.php?id=315021678&stat=91e2f106dc042be7fe29ceda1c1236d8
REQUEST
RESPONSE
GET 200 http://bingoroll6.net/bld.exe
REQUEST
RESPONSE
GET 200 http://bingoroll15.net/update.php?id=315021678&stat=91e2f106dc042be7fe29ceda1c1236d8&cmd=1
REQUEST
RESPONSE
GET 200 http://bingoroll15.net/update.php?id=315021678&stat=91e2f106dc042be7fe29ceda1c1236d8
REQUEST
RESPONSE
GET 200 http://bingoroll6.net/new.exe
REQUEST
RESPONSE
GET 200 http://bingoroll15.net/update.php?id=315021678&stat=91e2f106dc042be7fe29ceda1c1236d8&cmd=1
REQUEST
RESPONSE
GET 200 http://bingoroll15.net/update.php?id=315021678&stat=91e2f106dc042be7fe29ceda1c1236d8
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49184 -> 172.67.218.85:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 172.67.218.85:80 -> 192.168.56.102:49184 2014819 ET INFO Packed Executable Download Misc activity
TCP 172.67.218.85:80 -> 192.168.56.102:49184 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.102:49184 -> 172.67.218.85:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 192.168.56.102:49191 -> 104.26.12.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49184 -> 172.67.218.85:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 172.67.218.85:80 -> 192.168.56.102:49184 2014819 ET INFO Packed Executable Download Misc activity
TCP 161.156.67.100:5938 -> 192.168.56.102:49182 2008795 ET POLICY TeamViewer Keep-alive inbound Misc activity
TCP 192.168.56.102:49183 -> 104.21.80.70:80 2021747 ET MALWARE Win32.Spy/TVRat Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49183 -> 104.21.80.70:80 2021747 ET MALWARE Win32.Spy/TVRat Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49183 -> 104.21.80.70:80 2021747 ET MALWARE Win32.Spy/TVRat Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49183 -> 104.21.80.70:80 2021747 ET MALWARE Win32.Spy/TVRat Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49183 -> 104.21.80.70:80 2021747 ET MALWARE Win32.Spy/TVRat Checkin Malware Command and Control Activity Detected
TCP 192.168.56.102:49206 -> 104.26.12.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 45.138.72.167:25882 -> 192.168.56.102:49188 2221010 SURICATA HTTP unable to match response to request Generic Protocol Command Decode

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49191
104.26.12.31:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 7d:9f:08:6e:96:fc:4c:1d:eb:94:53:45:8a:6c:7e:e7:c1:69:47:e9
TLSv1
192.168.56.102:49206
104.26.12.31:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 7d:9f:08:6e:96:fc:4c:1d:eb:94:53:45:8a:6c:7e:e7:c1:69:47:e9

Snort Alerts

No Snort Alerts