Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
moon-bot.org | 82.146.63.123 |
- UDP Requests
-
-
192.168.56.101:61479 164.124.101.2:53
-
192.168.56.101:62324 164.124.101.2:53
-
192.168.56.101:137 192.168.56.255:137
-
192.168.56.101:138 192.168.56.255:138
-
192.168.56.101:49152 239.255.255.250:3702
-
192.168.56.101:62327 239.255.255.250:1900
-
192.168.56.101:62329 239.255.255.250:3702
-
192.168.56.101:62331 239.255.255.250:3702
-
192.168.56.101:62333 239.255.255.250:3702
-
52.231.114.183:123 192.168.56.101:123
-
GET
200
https://moon-bot.org/secret/verb.exe
REQUEST
RESPONSE
BODY
GET /secret/verb.exe HTTP/1.1
Host: moon-bot.org
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx/1.20.1
Date: Tue, 31 Aug 2021 03:50:27 GMT
Content-Type: application/x-msdos-program
Content-Length: 35328
Connection: keep-alive
Last-Modified: Sat, 28 Aug 2021 14:42:26 GMT
ETag: "8a00-5ca9f9bcd929c"
Accept-Ranges: bytes
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49202 -> 82.146.63.123:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49202 82.146.63.123:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=moon-bot.org | 08:67:8f:a9:e8:8b:88:18:60:5a:bb:f6:64:a6:6e:3a:75:86:0f:4b |
Snort Alerts
No Snort Alerts