NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.67.176.114 Active Moloch
92.119.113.140 Active Moloch
GET 0 https://sh1729062.b.had.su//cisCheckerstroke.php
REQUEST
RESPONSE
GET 0 https://sh1729062.b.had.su//gate.php?hwid=7C6024AD&os=6.1.7601&av=
REQUEST
RESPONSE
GET 0 https://sh1729062.b.had.su//loader.txt
REQUEST
RESPONSE
GET 404 http://sherence.ru/323.exe
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.102:52336 -> 164.124.101.2:53 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related Potentially Bad Traffic
TCP 192.168.56.102:49167 -> 92.119.113.140:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49168 -> 92.119.113.140:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49167
92.119.113.140:443
C=US, O=Let's Encrypt, CN=R3 CN=sh1729062.b.had.su 88:06:7e:5e:81:8f:09:cc:aa:20:de:ba:c6:ce:81:fb:49:2c:46:fa
TLSv1
192.168.56.102:49168
92.119.113.140:443
None None None

Snort Alerts

No Snort Alerts