NetWork | ZeroBOX

Network Analysis

IP Address Status Action
15.164.81.167 Active Moloch
151.101.52.209 Active Moloch
164.124.101.2 Active Moloch
185.199.109.154 Active Moloch
193.142.146.203 Active Moloch
208.95.112.1 Active Moloch
GET 200 http://ip-api.com/json/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49167 -> 15.164.81.167:443 2028375 ET JA3 Hash - Possible Malware - Java Based RAT Unknown Traffic
TCP 192.168.56.103:49170 -> 151.101.52.209:443 2028375 ET JA3 Hash - Possible Malware - Java Based RAT Unknown Traffic
TCP 192.168.56.103:49169 -> 151.101.52.209:443 2028375 ET JA3 Hash - Possible Malware - Java Based RAT Unknown Traffic
TCP 192.168.56.103:49168 -> 151.101.52.209:443 2028375 ET JA3 Hash - Possible Malware - Java Based RAT Unknown Traffic
TCP 192.168.56.103:49171 -> 185.199.109.154:443 2028375 ET JA3 Hash - Possible Malware - Java Based RAT Unknown Traffic
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49195 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.103:49186 -> 193.142.146.203:1981 2030358 ET MALWARE STRRAT CnC Checkin Malware Command and Control Activity Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49167
15.164.81.167:443
C=US, O=DigiCert, Inc., CN=DigiCert High Assurance TLS Hybrid ECC SHA256 2020 CA1 C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=github.com 84:63:b3:a9:29:12:cc:fd:1d:31:47:05:98:9b:ec:13:99:37:d0:d7
TLS 1.2
192.168.56.103:49170
151.101.52.209:443
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA C=US, ST=Maryland, L=Fulton, O=Sonatype, Inc, CN=repo1.maven.org 74:54:1d:15:cf:77:9e:e8:00:c2:ea:0d:77:6e:d3:02:51:0f:15:dd
TLS 1.2
192.168.56.103:49169
151.101.52.209:443
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA C=US, ST=Maryland, L=Fulton, O=Sonatype, Inc, CN=repo1.maven.org 74:54:1d:15:cf:77:9e:e8:00:c2:ea:0d:77:6e:d3:02:51:0f:15:dd
TLS 1.2
192.168.56.103:49168
151.101.52.209:443
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA C=US, ST=Maryland, L=Fulton, O=Sonatype, Inc, CN=repo1.maven.org 74:54:1d:15:cf:77:9e:e8:00:c2:ea:0d:77:6e:d3:02:51:0f:15:dd
TLS 1.2
192.168.56.103:49171
185.199.109.154:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=www.github.com 70:94:de:dd:e6:c4:69:48:3a:92:70:a1:48:56:78:2d:18:64:e0:b7

Snort Alerts

No Snort Alerts