NetWork | ZeroBOX

Network Analysis

IP Address Status Action
162.241.2.219 Active Moloch
164.124.101.2 Active Moloch
34.102.136.180 Active Moloch
GET 301 http://www.manualdobalconista.com/crg3/?Ulm=5aJYfJodYG6BrS0FfuAwGX0MfoQ+tl7mlPkfTpt57IVgoZ48UAgNU6sYsDPVuo0HUmr+aUbZ&TVg8Al=uFNXBt2HlNP8
REQUEST
RESPONSE
GET 403 http://www.thedecorcorner.com/crg3/?Ulm=jyRJRWWorKBrL9rPhTzn3uyL3ElVefX3VfTSscFXSKsmaYWV2Cj1pXrkGXbwLbU0ZvFEd1u4&TVg8Al=uFNXBt2HlNP8
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.101 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49204 -> 34.102.136.180:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49204 -> 34.102.136.180:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49204 -> 34.102.136.180:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49203 -> 162.241.2.219:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49203 -> 162.241.2.219:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49203 -> 162.241.2.219:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts