NetWork | ZeroBOX

Network Analysis

IP Address Status Action
142.250.196.110 Active Moloch
164.124.101.2 Active Moloch
Name Response Post-Analysis Lookup
drive.google.com 172.217.175.14
GET 404 https://drive.google.com/uc?export=download&id=1gBqvywOWfsStLEvq5ZjLlqCoaQdniUCl
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49201 -> 142.250.196.110:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49201
142.250.196.110:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.google.com 8f:b6:6e:35:48:00:39:39:d4:59:1a:58:7b:b6:38:5a:92:b0:b6:9f

Snort Alerts

No Snort Alerts