NetWork | ZeroBOX

Network Analysis

IP Address Status Action
162.159.130.233 Active Moloch
164.124.101.2 Active Moloch
34.94.136.184 Active Moloch
51.222.42.168 Active Moloch
GET 403 https://cdn.discordapp.com/attachments/876792192524501045/876837913906774076/1.dll
REQUEST
RESPONSE
GET 403 https://cdn.discordapp.com/attachments/876792192524501045/876837688651681843/1.dll
REQUEST
RESPONSE
GET 403 https://cdn.discordapp.com/attachments/876792192524501045/876837576193998848/1.dll
REQUEST
RESPONSE
GET 404 https://investtomontenegro.com/wp-content/plugins/wordpress-seo/lib/migrations/8dXd8jlaax.php
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.103 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49171 -> 162.159.130.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49173 -> 34.94.136.184:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49174 -> 51.222.42.168:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 51.222.42.168:443 -> 192.168.56.103:49176 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49175 -> 51.222.42.168:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49171
162.159.130.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da
TLSv1
192.168.56.103:49173
34.94.136.184:443
C=US, O=Let's Encrypt, CN=R3 CN=investtomontenegro.com 48:5a:fd:95:f4:1a:2d:dd:aa:b3:d6:d0:74:b2:a8:55:b2:c5:d2:5b

Snort Alerts

No Snort Alerts