NetWork | ZeroBOX

Network Analysis

IP Address Status Action
144.208.125.220 Active Moloch
164.124.101.2 Active Moloch
194.5.98.207 Active Moloch
216.58.200.78 Active Moloch
GET 200 http://dreamwatchevent.com/.well-known/pki-validation/Attack.jpg
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.102 216.58.200.78 8 abcdefghijklmnopqrstuvwabcdefghi
216.58.200.78 192.168.56.102 0 abcdefghijklmnopqrstuvwabcdefghi

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 144.208.125.220:80 -> 192.168.56.102:49171 2012398 ET WEB_CLIENT Hex Obfuscation of replace Javascript Function % Encoding Potentially Bad Traffic
TCP 144.208.125.220:80 -> 192.168.56.102:49171 2013145 ET SHELLCODE Possible %41%41%41%41 Heap Spray Attempt Executable code was detected
UDP 192.168.56.102:58838 -> 164.124.101.2:53 2022918 ET INFO DYNAMIC_DNS Query to *.duckdns. Domain Misc activity
TCP 144.208.125.220:80 -> 192.168.56.102:49171 2012398 ET WEB_CLIENT Hex Obfuscation of replace Javascript Function % Encoding Potentially Bad Traffic
TCP 144.208.125.220:80 -> 192.168.56.102:49171 2013145 ET SHELLCODE Possible %41%41%41%41 Heap Spray Attempt Executable code was detected
TCP 144.208.125.220:80 -> 192.168.56.102:49171 2013145 ET SHELLCODE Possible %41%41%41%41 Heap Spray Attempt Executable code was detected
TCP 144.208.125.220:80 -> 192.168.56.102:49171 2013145 ET SHELLCODE Possible %41%41%41%41 Heap Spray Attempt Executable code was detected
TCP 144.208.125.220:80 -> 192.168.56.102:49171 2013145 ET SHELLCODE Possible %41%41%41%41 Heap Spray Attempt Executable code was detected
TCP 144.208.125.220:80 -> 192.168.56.102:49171 2013145 ET SHELLCODE Possible %41%41%41%41 Heap Spray Attempt Executable code was detected
TCP 144.208.125.220:80 -> 192.168.56.102:49171 2013145 ET SHELLCODE Possible %41%41%41%41 Heap Spray Attempt Executable code was detected
TCP 144.208.125.220:80 -> 192.168.56.102:49171 2013145 ET SHELLCODE Possible %41%41%41%41 Heap Spray Attempt Executable code was detected
TCP 144.208.125.220:80 -> 192.168.56.102:49171 2012398 ET WEB_CLIENT Hex Obfuscation of replace Javascript Function % Encoding Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.3
192.168.56.102:49174
194.5.98.207:691
None None None

Snort Alerts

No Snort Alerts