Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
www.facebook.com | 157.240.215.35 | |
store2.gofile.io | 31.14.69.10 | |
www.google.com | 172.217.31.132 | |
www.twitter.com |
CNAME
twitter.com
|
104.244.42.129 |
- UDP Requests
-
-
192.168.56.102:52062 164.124.101.2:53
-
192.168.56.102:52336 164.124.101.2:53
-
192.168.56.102:54322 164.124.101.2:53
-
192.168.56.102:58838 164.124.101.2:53
-
192.168.56.102:61115 164.124.101.2:53
-
192.168.56.102:64034 164.124.101.2:53
-
192.168.56.102:64472 164.124.101.2:53
-
192.168.56.102:64995 164.124.101.2:53
-
192.168.56.102:137 192.168.56.255:137
-
192.168.56.102:138 192.168.56.255:138
-
192.168.56.102:49152 239.255.255.250:3702
-
192.168.56.102:49164 239.255.255.250:1900
-
52.231.114.183:123 192.168.56.102:123
-
GET
200
https://store2.gofile.io/download/44989e53-4040-4cf6-800e-087ac6154184/Iuugtkemaayyziygy.dll
REQUEST
RESPONSE
BODY
GET /download/44989e53-4040-4cf6-800e-087ac6154184/Iuugtkemaayyziygy.dll HTTP/1.1
Host: store2.gofile.io
Connection: Keep-Alive
HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Origin: *
Content-Disposition: attachment; filename="Iuugtkemaayyziygy.dll"
Content-Length: 573456
Content-Type: application/octet-stream
Date: Wed, 22 Sep 2021 01:07:21 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Powered-By: Express
X-Xss-Protection: 1; mode=block
ICMP traffic
Source | Destination | ICMP Type | Data |
---|---|---|---|
192.168.56.102 | 104.244.42.193 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
104.244.42.193 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 104.244.42.193 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
104.244.42.193 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 104.244.42.193 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
104.244.42.193 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 104.244.42.193 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
104.244.42.193 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 142.250.204.132 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
142.250.204.132 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 142.250.204.132 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
142.250.204.132 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 142.250.204.132 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
142.250.204.132 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 142.250.204.132 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
142.250.204.132 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 157.240.215.35 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
157.240.215.35 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 157.240.215.35 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
157.240.215.35 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 157.240.215.35 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
157.240.215.35 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 157.240.215.35 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
157.240.215.35 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 204.79.197.200 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
204.79.197.200 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 204.79.197.200 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
204.79.197.200 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 204.79.197.200 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
204.79.197.200 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
192.168.56.102 | 204.79.197.200 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
204.79.197.200 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49169 -> 31.14.69.10:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.102:49169 31.14.69.10:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.gofile.io | 4c:cc:6b:32:8f:55:d8:cc:fa:f4:4d:ae:80:a1:dd:b7:e3:e2:84:ae |
Snort Alerts
No Snort Alerts