NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
185.244.41.39 Active Moloch
95.215.205.85 Active Moloch
Name Response Post-Analysis Lookup
builder.pp.ru 185.244.41.39
GET 200 https://builder.pp.ru/testqcwqebqweqwe.dll
REQUEST
RESPONSE
GET 404 http://95.215.205.85/638394261.exe
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49165 -> 95.215.205.85:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 192.168.56.102:49164 -> 185.244.41.39:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49164
185.244.41.39:443
C=US, O=Let's Encrypt, CN=R3 CN=builder.pp.ru f5:a6:86:aa:ac:60:8d:af:fa:e4:83:56:09:f9:43:62:e0:34:80:e8

Snort Alerts

No Snort Alerts