Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Aug. 28, 2021, 5:43 p.m. | Aug. 28, 2021, 5:52 p.m. |
-
Rbget.exe "C:\Users\test22\AppData\Local\Temp\Rbget.exe"
2516
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 185.215.113.102:1234 -> 192.168.56.102:49165 | 2400024 | ET DROP Spamhaus DROP Listed Traffic Inbound group 25 | Misc Attack |
TCP 192.168.56.102:49168 -> 185.215.113.102:1234 | 906200098 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (BitRAT) | undefined |
TCP 192.168.56.102:49167 -> 185.215.113.102:1234 | 906200098 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (BitRAT) | undefined |
TCP 192.168.56.102:49165 -> 185.215.113.102:1234 | 906200098 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (BitRAT) | undefined |
TCP 185.215.113.102:1234 -> 192.168.56.102:49165 | 2030724 | ET MALWARE Observed Malicious SSL Cert (BitRAT CnC) | Domain Observed Used for C2 Detected |
TCP 185.215.113.102:1234 -> 192.168.56.102:49168 | 2030724 | ET MALWARE Observed Malicious SSL Cert (BitRAT CnC) | Domain Observed Used for C2 Detected |
TCP 185.215.113.102:1234 -> 192.168.56.102:49167 | 2030724 | ET MALWARE Observed Malicious SSL Cert (BitRAT CnC) | Domain Observed Used for C2 Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.102:49168 185.215.113.102:1234 |
CN=BitRAT | CN=BitRAT | aa:a8:0d:a0:d9:fb:84:90:ca:73:1e:67:ee:78:20:7e:bf:f4:75:3c |
TLS 1.2 192.168.56.102:49167 185.215.113.102:1234 |
CN=BitRAT | CN=BitRAT | aa:a8:0d:a0:d9:fb:84:90:ca:73:1e:67:ee:78:20:7e:bf:f4:75:3c |
TLS 1.2 192.168.56.102:49165 185.215.113.102:1234 |
CN=BitRAT | CN=BitRAT | aa:a8:0d:a0:d9:fb:84:90:ca:73:1e:67:ee:78:20:7e:bf:f4:75:3c |