NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
23.227.202.195 Active Moloch
Name Response Post-Analysis Lookup
officeproductupdate.com 23.227.202.195
OPTIONS 200 https://officeproductupdate.com/
REQUEST
RESPONSE
HEAD 200 https://officeproductupdate.com/xenyl.xlt
REQUEST
RESPONSE
OPTIONS 200 https://officeproductupdate.com/
REQUEST
RESPONSE
GET 200 https://officeproductupdate.com/xenyl.xlt
REQUEST
RESPONSE
HEAD 200 https://officeproductupdate.com/xenyl.xlt
REQUEST
RESPONSE
HEAD 200 https://officeproductupdate.com/xenyl.xlt
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49168 -> 23.227.202.195:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49171 -> 23.227.202.195:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49168
23.227.202.195:443
C=LV, L=Riga, O=GoGetSSL, CN=GoGetSSL RSA DV CA CN=officeproductupdate.com 95:40:e2:6b:9a:06:47:28:61:73:7e:59:b3:84:0a:95:aa:e8:4f:3f
TLSv1
192.168.56.103:49171
23.227.202.195:443
C=LV, L=Riga, O=GoGetSSL, CN=GoGetSSL RSA DV CA CN=officeproductupdate.com 95:40:e2:6b:9a:06:47:28:61:73:7e:59:b3:84:0a:95:aa:e8:4f:3f

Snort Alerts

No Snort Alerts