NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
188.119.112.104 Active Moloch
195.201.225.248 Active Moloch
Name Response Post-Analysis Lookup
telete.in 195.201.225.248
GET 200 https://telete.in/timkamrstones
REQUEST
RESPONSE
POST 200 http://188.119.112.104/
REQUEST
RESPONSE
GET 200 http://188.119.112.104//l/f/VBAid3sBPvGyIjkLf2Nw/742118b82ff74305984a7e59870122d8a9d4dfc5
REQUEST
RESPONSE
GET 200 http://188.119.112.104//l/f/VBAid3sBPvGyIjkLf2Nw/9ab15261acd699b63cbb2fd30e8437e27387589f
REQUEST
RESPONSE
POST 200 http://188.119.112.104/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49204 -> 195.201.225.248:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 188.119.112.104:80 -> 192.168.56.101:49205 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 188.119.112.104:80 -> 192.168.56.101:49205 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 188.119.112.104:80 -> 192.168.56.101:49205 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49204
195.201.225.248:443
C=US, O=Let's Encrypt, CN=R3 CN=telecut.in be:a6:3d:e8:93:c3:13:0b:5f:1d:3a:f7:63:57:4c:39:0e:96:df:5e

Snort Alerts

No Snort Alerts