NetWork | ZeroBOX

Network Analysis

IP Address Status Action
103.133.111.149 Active Moloch
103.133.111.221 Active Moloch
164.124.101.2 Active Moloch
Name Response Post-Analysis Lookup
xp19.ddns.net 103.133.111.221
GET 200 http://103.133.111.149/XP-remcos_mXwRejN225.bin
REQUEST
RESPONSE
GET 200 http://103.133.111.149/XP-remcos_mXwRejN225.bin
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.102:52062 -> 164.124.101.2:53 2028675 ET POLICY DNS Query to DynDNS Domain *.ddns .net Potentially Bad Traffic
TCP 192.168.56.102:49173 -> 103.133.111.149:80 2018752 ET MALWARE Generic .bin download from Dotted Quad A Network Trojan was detected
TCP 192.168.56.102:49166 -> 103.133.111.149:80 2018752 ET MALWARE Generic .bin download from Dotted Quad A Network Trojan was detected
TCP 192.168.56.102:49174 -> 103.133.111.221:1996 2025637 ET MALWARE Remcos RAT Checkin 23 Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts