NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.244.42.129 Active Moloch
142.250.66.68 Active Moloch
157.240.215.35 Active Moloch
164.124.101.2 Active Moloch
31.14.69.10 Active Moloch
GET 200 https://store2.gofile.io/download/5c9d4064-4708-4f82-b830-1ebe74778b3b/Luwwfkikt.dll
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.101 104.244.42.129 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.129 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 104.244.42.129 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.129 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 104.244.42.129 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.129 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 104.244.42.129 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.129 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 142.250.66.68 8 abcdefghijklmnopqrstuvwabcdefghi
142.250.66.68 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 142.250.66.68 8 abcdefghijklmnopqrstuvwabcdefghi
142.250.66.68 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 142.250.66.68 8 abcdefghijklmnopqrstuvwabcdefghi
142.250.66.68 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 142.250.66.68 8 abcdefghijklmnopqrstuvwabcdefghi
142.250.66.68 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 157.240.215.35 8 abcdefghijklmnopqrstuvwabcdefghi
157.240.215.35 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 157.240.215.35 8 abcdefghijklmnopqrstuvwabcdefghi
157.240.215.35 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 157.240.215.35 8 abcdefghijklmnopqrstuvwabcdefghi
157.240.215.35 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 157.240.215.35 8 abcdefghijklmnopqrstuvwabcdefghi
157.240.215.35 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 204.79.197.200 8 abcdefghijklmnopqrstuvwabcdefghi
204.79.197.200 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 204.79.197.200 8 abcdefghijklmnopqrstuvwabcdefghi
204.79.197.200 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 204.79.197.200 8 abcdefghijklmnopqrstuvwabcdefghi
204.79.197.200 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 204.79.197.200 8 abcdefghijklmnopqrstuvwabcdefghi
204.79.197.200 192.168.56.101 0 abcdefghijklmnopqrstuvwabcdefghi

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49206 -> 31.14.69.10:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.101:49206
31.14.69.10:443
C=US, O=Let's Encrypt, CN=R3 CN=*.gofile.io 4c:cc:6b:32:8f:55:d8:cc:fa:f4:4d:ae:80:a1:dd:b7:e3:e2:84:ae

Snort Alerts

No Snort Alerts