NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
37.49.230.185 Active Moloch
Name Response Post-Analysis Lookup
No hosts contacted.
POST 200 http://37.49.230.185/bp/gate.php?017BD04FB3BF45B68167E
REQUEST
RESPONSE
POST 200 http://37.49.230.185/bp/gate.php?017BD04FB3BF45B68167E
REQUEST
RESPONSE
POST 200 http://37.49.230.185/bp/gate.php?017BD04FB3BF45B68167E
REQUEST
RESPONSE
POST 200 http://37.49.230.185/bp/gate.php?017BD04FB3BF45B68167E
REQUEST
RESPONSE
POST 200 http://37.49.230.185/bp/gate.php?017BD04FB3BF45B68167E
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49215 -> 37.49.230.185:80 2017930 ET MALWARE Trojan Generic - POST To gate.php with no referer A Network Trojan was detected
TCP 192.168.56.101:49215 -> 37.49.230.185:80 2022985 ET MALWARE Trojan Generic - POST To gate.php with no accept headers A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2017930 ET MALWARE Trojan Generic - POST To gate.php with no referer A Network Trojan was detected
TCP 192.168.56.101:49215 -> 37.49.230.185:80 2022986 ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2022985 ET MALWARE Trojan Generic - POST To gate.php with no accept headers A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2022986 ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad A Network Trojan was detected
TCP 192.168.56.101:49215 -> 37.49.230.185:80 2017930 ET MALWARE Trojan Generic - POST To gate.php with no referer A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2017930 ET MALWARE Trojan Generic - POST To gate.php with no referer A Network Trojan was detected
TCP 192.168.56.101:49215 -> 37.49.230.185:80 2022985 ET MALWARE Trojan Generic - POST To gate.php with no accept headers A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2022985 ET MALWARE Trojan Generic - POST To gate.php with no accept headers A Network Trojan was detected
TCP 192.168.56.101:49215 -> 37.49.230.185:80 2022986 ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2022986 ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2017930 ET MALWARE Trojan Generic - POST To gate.php with no referer A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2022985 ET MALWARE Trojan Generic - POST To gate.php with no accept headers A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2022986 ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad A Network Trojan was detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts