NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
168.119.93.163 Active Moloch
34.98.99.30 Active Moloch
GET 200 https://pastebin.pl/view/raw/b8b10b85
REQUEST
RESPONSE
GET 403 http://www.champsmaker.com/hh3t/?wP9=NCipgQerCfphd5DTbGF/kFoZZkzsi4tPI1A2Kby7UVlcXZ+cuGCRB/mgzgBvre+yD2+t/g2H&lZQ=7nbLpdZHS
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49163 -> 168.119.93.163:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49170 -> 34.98.99.30:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49170 -> 34.98.99.30:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49170 -> 34.98.99.30:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49163
168.119.93.163:443
C=US, O=Let's Encrypt, CN=R3 CN=www.pastebin.pl ac:45:0d:b9:ff:83:11:c8:c5:12:c5:2f:cd:cb:f0:77:cd:f9:9f:3e

Snort Alerts

No Snort Alerts