NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
5.181.156.77 Active Moloch
95.216.186.40 Active Moloch
Name Response Post-Analysis Lookup
tttttt.me 95.216.186.40
GET 200 https://tttttt.me/h_biggsize_1
REQUEST
RESPONSE
POST 200 http://5.181.156.77/
REQUEST
RESPONSE
GET 200 http://5.181.156.77//l/f/S4ty3HsB3dP17SpztiCF/71338ba4b086d102b5d8093083a97f3e57fb0994
REQUEST
RESPONSE
GET 200 http://5.181.156.77//l/f/S4ty3HsB3dP17SpztiCF/05464af9e92727debe47772767b166c2c2f9e61c
REQUEST
RESPONSE
POST 200 http://5.181.156.77/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49197 -> 95.216.186.40:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 5.181.156.77:80 -> 192.168.56.101:49200 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 5.181.156.77:80 -> 192.168.56.101:49200 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 5.181.156.77:80 -> 192.168.56.101:49200 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49197
95.216.186.40:443
C=US, O=Let's Encrypt, CN=R3 CN=tttttt.me ec:37:89:0f:25:00:0a:45:b3:01:d4:6c:07:5c:27:2c:04:de:7c:70

Snort Alerts

No Snort Alerts