NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.35.128 Active Moloch
104.26.13.31 Active Moloch
149.154.167.220 Active Moloch
164.124.101.2 Active Moloch
172.67.176.114 Active Moloch
194.15.46.144 Active Moloch
92.119.113.140 Active Moloch
GET 200 https://api.ip.sb/geoip
REQUEST
RESPONSE
GET 404 https://sh1729062.b.had.su//cisCheckerstroke.php
REQUEST
RESPONSE
GET 200 https://sh1729062.b.had.su//gate.php?hwid=7C6024AD&os=6.1.7601&av=
REQUEST
RESPONSE
GET 0 https://sh1729062.b.had.su//loader.txt
REQUEST
RESPONSE
GET 200 http://sherence.ru/123123.exe
REQUEST
RESPONSE
GET 200 http://sherence.ru/Stub1.exe
REQUEST
RESPONSE
GET 0 http://sherence.ru/PhoenixMiner.exe
REQUEST
RESPONSE
GET 0 http://sherence.ru/xmrig.exe
REQUEST
RESPONSE
GET 404 http://sherence.ru/323.exe
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49166 -> 104.26.13.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.176.114:80 -> 192.168.56.102:49179 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 172.67.176.114:80 -> 192.168.56.102:49179 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 149.154.167.220:443 -> 192.168.56.102:49183 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.102:49183 -> 149.154.167.220:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 149.154.167.220:443 -> 192.168.56.102:49188 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.102:49188 -> 149.154.167.220:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49179 -> 172.67.176.114:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 172.67.176.114:80 -> 192.168.56.102:49179 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
UDP 192.168.56.102:64034 -> 164.124.101.2:53 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related Potentially Bad Traffic
TCP 192.168.56.102:49191 -> 92.119.113.140:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49192 -> 92.119.113.140:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49166
104.26.13.31:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 7d:9f:08:6e:96:fc:4c:1d:eb:94:53:45:8a:6c:7e:e7:c1:69:47:e9
TLSv1
192.168.56.102:49191
92.119.113.140:443
C=US, O=Let's Encrypt, CN=R3 CN=sh1729062.b.had.su 88:06:7e:5e:81:8f:09:cc:aa:20:de:ba:c6:ce:81:fb:49:2c:46:fa
TLSv1
192.168.56.102:49192
92.119.113.140:443
None None None

Snort Alerts

No Snort Alerts