NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
188.72.236.136 Active Moloch
40.76.50.119 Active Moloch
91.195.240.94 Active Moloch
GET 404 http://www.wrg-referrals.com/b6cu/?Tj=fPxRTLMEZqSgZG8FNoOWfqBucxYqhmqN1pK96IwIV9bSZwvtX5xjyugxBOQeybrPpWmy7szm&6l=s8eTzlAXATylM
REQUEST
RESPONSE
GET 404 http://www.freedownloadbiz.info/b6cu/?Tj=jXWkHSc2ZyHJS3BmNHN6MvtQCT40AMmKDINV4DjTDfuj9RfOhNLCD9USSIKdul+56GiADOwV&6l=s8eTzlAXATylM
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.102 164.124.101.2 3
192.168.56.102 164.124.101.2 3
192.168.56.102 164.124.101.2 3
192.168.56.102 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49168 -> 40.76.50.119:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49169 -> 188.72.236.136:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49168 -> 40.76.50.119:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49169 -> 188.72.236.136:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49168 -> 40.76.50.119:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49169 -> 188.72.236.136:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts