NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.19.185.120 Active Moloch
104.74.219.56 Active Moloch
153.92.0.100 Active Moloch
162.125.84.18 Active Moloch
164.124.101.2 Active Moloch
172.217.26.14 Active Moloch
34.102.136.180 Active Moloch
34.80.190.141 Active Moloch
69.42.215.252 Active Moloch
72.52.178.23 Active Moloch
99.83.154.118 Active Moloch
GET 404 https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
REQUEST
RESPONSE
GET 301 https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
REQUEST
RESPONSE
GET 404 https://www.dropbox.com/s/dl/fzj752whr3ontsm/SSLLibrary.dll
REQUEST
RESPONSE
GET 403 https://www.000webhost.com/migrate?static=true
REQUEST
RESPONSE
GET 403 http://www.livingalcohol.com/b0ar/?r6=32cJvtm6v5CrHkGtRaCKvnIzMPMaS8klC7QMWGugGRjVzPiNEaTJc2oUIDqYaKdywZUrkA7f&sBZxr2=FxopsJeXPvOX3
REQUEST
RESPONSE
GET 403 http://www.artjohntravis.com/b0ar/?r6=FI6V3ciXB53f+evAnSijLVseR7Fj9SHqs11tijwh7SEaqCYqOPT9yA6Mp0JLeXWl2GeMTJcV&sBZxr2=FxopsJeXPvOX3
REQUEST
RESPONSE
GET 403 http://www.thepink.club/b0ar/?r6=35zmK/1nOG3ZiclOaRDNqBcycOB07sOwoO1SOSl9YfrEiskurZgjdyrE07vb97UKsZwkKKa4&sBZxr2=FxopsJeXPvOX3
REQUEST
RESPONSE
GET 301 http://www.mcinerneychrysler.com/b0ar/?r6=oBVrEuqKUfopUpAnqJfem3AP4MxLKUs3kUwU0NiQ7+oE8UvVtrvEXTcSUGgYTlPvZxyytEEp&sBZxr2=FxopsJeXPvOX3
REQUEST
RESPONSE
GET 0 http://www.vnielvmdqxk538.xyz/b0ar/?r6=7CUt39hPMjg/s6qQ0+QbWtikgyOufco6CG9l+t5DjC9/JIPCU/WxQ6IAIg/iVENqz91MlH14&sBZxr2=FxopsJeXPvOX3
REQUEST
RESPONSE
GET 200 http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
REQUEST
RESPONSE
GET 301 http://www.algarmotorcars.com/b0ar/?r6=GBw5w5TP0zGw7Ui1KyuWLvjFNgn/VJyG24akOFBAUZbsXTnWiW1DuuZdfbFm7e75UOMWX9j4&sBZxr2=FxopsJeXPvOX3
REQUEST
RESPONSE
GET 301 http://xred.site50.net/syn/SSLLibrary.dll
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.102 164.124.101.2 3
192.168.56.102 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49168 -> 34.102.136.180:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49176 -> 72.52.178.23:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49168 -> 34.102.136.180:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49176 -> 72.52.178.23:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49168 -> 34.102.136.180:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49176 -> 72.52.178.23:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49176 -> 72.52.178.23:80 2031088 ET HUNTING Request to .XYZ Domain with Minimal Headers Potentially Bad Traffic
TCP 192.168.56.102:49171 -> 104.74.219.56:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49171 -> 104.74.219.56:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49171 -> 104.74.219.56:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49183 -> 162.125.84.18:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49182 -> 172.217.26.14:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.102:64472 -> 164.124.101.2:53 2015633 ET INFO DYNAMIC_DNS Query to Abused Domain *.mooo.com Misc activity
TCP 192.168.56.102:49185 -> 104.19.185.120:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.125.84.18:443 -> 192.168.56.102:49183 2012647 ET POLICY Dropbox.com Offsite File Backup in Use Potential Corporate Privacy Violation
TCP 192.168.56.102:49184 -> 153.92.0.100:80 2013224 ET HUNTING Suspicious User-Agent Containing .exe A Network Trojan was detected
TCP 192.168.56.102:49169 -> 34.102.136.180:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49169 -> 34.102.136.180:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49169 -> 34.102.136.180:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49180 -> 34.80.190.141:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49180 -> 34.80.190.141:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49180 -> 34.80.190.141:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49170 -> 99.83.154.118:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49170 -> 99.83.154.118:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49170 -> 99.83.154.118:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49183
162.125.84.18:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA C=US, ST=California, L=San Francisco, O=Dropbox, Inc, CN=*.dropbox.com 3b:3c:24:9c:f2:3f:43:52:f1:1b:a4:f7:5d:18:a7:34:23:49:8f:7a
TLSv1
192.168.56.102:49182
172.217.26.14:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.google.com 8f:b6:6e:35:48:00:39:39:d4:59:1a:58:7b:b6:38:5a:92:b0:b6:9f
TLSv1
192.168.56.102:49185
104.19.185.120:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.000webhost.com 89:ac:2f:41:6f:58:00:a2:08:f3:6f:fd:5a:5e:15:8c:39:20:d8:99

Snort Alerts

No Snort Alerts