NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
195.201.225.248 Active Moloch
5.181.156.77 Active Moloch
Name Response Post-Analysis Lookup
telete.in 195.201.225.248
GET 200 https://telete.in/bibaramensup
REQUEST
RESPONSE
POST 200 http://5.181.156.77/
REQUEST
RESPONSE
GET 200 http://5.181.156.77//l/f/_ImE03sB3dP17SpzLfMM/3363f52ac827a35d92214b8e5136f72be3acbb8d
REQUEST
RESPONSE
GET 200 http://5.181.156.77//l/f/_ImE03sB3dP17SpzLfMM/43003380ff8ec12ed78991d097ba13f61b7c0204
REQUEST
RESPONSE
POST 200 http://5.181.156.77/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49199 -> 195.201.225.248:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 5.181.156.77:80 -> 192.168.56.101:49202 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 5.181.156.77:80 -> 192.168.56.101:49202 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 5.181.156.77:80 -> 192.168.56.101:49202 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49199
195.201.225.248:443
C=US, O=Let's Encrypt, CN=R3 CN=telecut.in be:a6:3d:e8:93:c3:13:0b:5f:1d:3a:f7:63:57:4c:39:0e:96:df:5e

Snort Alerts

No Snort Alerts