NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.42.16.175 Active Moloch
164.124.101.2 Active Moloch
208.91.197.46 Active Moloch
47.91.170.222 Active Moloch
GET 200 http://www.tijprintersolution.com/utrf/?EZA4Dv=L2svVb92Me7XPiVF7aaorHdCyxGEk9sqT+LYZOj9a4pmUmwib36vvLRubxA8uAZ/BnXkUSVN&DzrLH=VBZHTpkXnn1TKz
REQUEST
RESPONSE
GET 200 http://www.spyrodinero.com/utrf/?EZA4Dv=KQbHNIk3IOJpZvsSnT4OJ/X4/hEQqeZz8HC9HeygUUs08q8KumgzMZqNo+5TDnVW3UvDLF98&DzrLH=VBZHTpkXnn1TKz
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.102:52336 -> 164.124.101.2:53 2026888 ET INFO DNS Query for Suspicious .icu Domain Potentially Bad Traffic
TCP 192.168.56.102:49169 -> 208.91.197.46:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49169 -> 208.91.197.46:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49169 -> 208.91.197.46:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49168 -> 104.42.16.175:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49168 -> 104.42.16.175:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49168 -> 104.42.16.175:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts