NetWork | ZeroBOX

Network Analysis

IP Address Status Action
185.56.175.122 Active Moloch
104.26.13.31 Active Moloch
164.124.101.2 Active Moloch
185.186.142.152 Active Moloch
81.177.141.36 Active Moloch
51.79.249.161 Active Moloch
GET 200 https://api.ip.sb/geoip
REQUEST
RESPONSE
GET 403 https://dimluui.ru/136583554.exe
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49166 -> 104.26.13.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49175 -> 81.177.141.36:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49166
104.26.13.31:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 7d:9f:08:6e:96:fc:4c:1d:eb:94:53:45:8a:6c:7e:e7:c1:69:47:e9
TLS 1.2
192.168.56.102:49175
81.177.141.36:443
C=US, O=Let's Encrypt, CN=R3 CN=*.dimluui.ru 3f:cc:92:e6:28:0c:55:58:a1:09:c4:33:64:7e:5c:80:a2:69:0a:04

Snort Alerts

No Snort Alerts