NetWork | ZeroBOX

Network Analysis

IP Address Status Action
136.243.159.53 Active Moloch
164.124.101.2 Active Moloch
172.217.161.161 Active Moloch
172.217.25.238 Active Moloch
23.95.85.181 Active Moloch
GET 302 https://drive.google.com/uc?export=download&id=1u_LDPUBD8svIuWN6M_dYDxV9pWS_PZM_
REQUEST
RESPONSE
GET 200 https://doc-00-1c-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/44otpfku4m84nv2baa4uts53scs88sf5/1631525475000/14552286414405439806/*/1u_LDPUBD8svIuWN6M_dYDxV9pWS_PZM_?e=download
REQUEST
RESPONSE
GET 200 http://23.95.85.181/http/vbc.exe
REQUEST
RESPONSE
POST 404 http://136.243.159.53/~element/page.php?id=429
REQUEST
RESPONSE
POST 404 http://136.243.159.53/~element/page.php?id=429
REQUEST
RESPONSE
POST 404 http://136.243.159.53/~element/page.php?id=429
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49210 -> 172.217.25.238:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49204 -> 23.95.85.181:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 192.168.56.101:49204 -> 23.95.85.181:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 23.95.85.181:80 -> 192.168.56.101:49204 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 23.95.85.181:80 -> 192.168.56.101:49204 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 23.95.85.181:80 -> 192.168.56.101:49204 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 23.95.85.181:80 -> 192.168.56.101:49204 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49211 -> 172.217.161.161:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49213 -> 136.243.159.53:80 2021641 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected
TCP 192.168.56.101:49212 -> 136.243.159.53:80 2021641 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected
TCP 192.168.56.101:49213 -> 136.243.159.53:80 2025381 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49212 -> 136.243.159.53:80 2025381 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49214 -> 136.243.159.53:80 2021641 ET MALWARE LokiBot User-Agent (Charon/Inferno) A Network Trojan was detected
TCP 192.168.56.101:49214 -> 136.243.159.53:80 2025381 ET MALWARE LokiBot Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49213 -> 136.243.159.53:80 2024312 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 A Network Trojan was detected
TCP 192.168.56.101:49212 -> 136.243.159.53:80 2024312 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 A Network Trojan was detected
TCP 192.168.56.101:49213 -> 136.243.159.53:80 2024317 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2 A Network Trojan was detected
TCP 192.168.56.101:49212 -> 136.243.159.53:80 2024317 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2 A Network Trojan was detected
TCP 192.168.56.101:49214 -> 136.243.159.53:80 2024313 ET MALWARE LokiBot Request for C2 Commands Detected M1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49214 -> 136.243.159.53:80 2024318 ET MALWARE LokiBot Request for C2 Commands Detected M2 Malware Command and Control Activity Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49210
172.217.25.238:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.google.com ef:1f:1c:2c:41:c4:ed:3c:4e:60:4f:56:1b:ed:09:ba:e9:e1:39:2d
TLSv1
192.168.56.101:49211
172.217.161.161:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.googleusercontent.com c2:32:d6:56:55:c0:b4:21:45:21:7a:75:1d:7a:a2:fb:a5:1f:5f:ea

Snort Alerts

No Snort Alerts