NetWork | ZeroBOX

Network Analysis

IP Address Status Action
184.74.99.214 Active Moloch
179.42.137.107 Active Moloch
186.4.193.75 Active Moloch
Name Response Post-Analysis Lookup
No hosts contacted.
GET 200 https://186.4.193.75/tot152/TEST22-PC_W617601.3BBA0CFF68E3F779B5F041BB34213194/5/kps/
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
177.91.75.182 192.168.56.102 11
177.91.75.182 192.168.56.102 11

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49170 -> 184.74.99.214:443 2404309 ET CNC Feodo Tracker Reported CnC Server group 10 A Network Trojan was detected
TCP 186.4.193.75:443 -> 192.168.56.102:49166 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 192.168.56.102:49166 -> 186.4.193.75:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 186.4.193.75:443 -> 192.168.56.102:49166 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49166
186.4.193.75:443
C=NE, ST=none, L=Comman, O=Beurret, CN=badan.ch/emailAddress=mccoybrianna@jackson-hodges.com C=NE, ST=none, L=Comman, O=Beurret, CN=badan.ch/emailAddress=mccoybrianna@jackson-hodges.com 7d:cf:67:bf:06:62:f0:33:33:e5:7f:67:7d:85:dd:59:6c:92:1c:b5

Snort Alerts

No Snort Alerts