NetWork | ZeroBOX

Network Analysis

IP Address Status Action
103.56.207.230 Active Moloch
104.26.13.31 Active Moloch
164.124.101.2 Active Moloch
171.103.187.218 Active Moloch
171.103.189.118 Active Moloch
186.4.193.75 Active Moloch
GET 200 https://api.ip.sb/ip
REQUEST
RESPONSE
GET 200 https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/5/kps/
REQUEST
RESPONSE
GET 200 https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/RJPBpVX7jvvD7VvtdNZdpR3lrFpX/
REQUEST
RESPONSE
GET 200 https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/14/exc/E:%200xc0000005%20A:%200x0000000077919A5A/0/
REQUEST
RESPONSE
GET 200 https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/14/user/test22/0/
REQUEST
RESPONSE
GET 200 https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/14/NAT%20status/client%20is%20behind%20NAT/0/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 171.103.187.218:449 -> 192.168.56.102:49170 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 192.168.56.102:49169 -> 104.26.13.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 171.103.189.118:449 -> 192.168.56.102:49168 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 171.103.187.218:449 -> 192.168.56.102:49171 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 192.168.56.102:49170 -> 171.103.187.218:449 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.102:49171 -> 171.103.187.218:449 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.102:49168 -> 171.103.189.118:449 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 171.103.189.118:449 -> 192.168.56.102:49168 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 171.103.187.218:449 -> 192.168.56.102:49170 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 186.4.193.75:443 -> 192.168.56.102:49174 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 171.103.187.218:449 -> 192.168.56.102:49171 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 192.168.56.102:49174 -> 186.4.193.75:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 186.4.193.75:443 -> 192.168.56.102:49174 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 186.4.193.75:443 -> 192.168.56.102:49175 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 171.103.187.218:449 -> 192.168.56.102:49176 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 171.103.187.218:449 -> 192.168.56.102:49177 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 192.168.56.102:49175 -> 186.4.193.75:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.102:49176 -> 171.103.187.218:449 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.102:49177 -> 171.103.187.218:449 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 186.4.193.75:443 -> 192.168.56.102:49175 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 171.103.187.218:449 -> 192.168.56.102:49176 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 171.103.187.218:449 -> 192.168.56.102:49177 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 171.103.187.218:449 -> 192.168.56.102:49178 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity
TCP 192.168.56.102:49178 -> 171.103.187.218:449 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 171.103.187.218:449 -> 192.168.56.102:49178 2015686 ET POLICY Signed TLS Certificate with md5WithRSAEncryption Misc activity

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49169
104.26.13.31:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 7d:9f:08:6e:96:fc:4c:1d:eb:94:53:45:8a:6c:7e:e7:c1:69:47:e9
TLSv1
192.168.56.102:49171
171.103.187.218:449
ST=none ST=none f7:5a:a2:97:54:74:9a:70:68:70:a3:3f:94:72:bd:3d:aa:8e:4b:45
TLSv1
192.168.56.102:49168
171.103.189.118:449
ST=none ST=none 1c:37:26:a3:ac:d1:cc:49:a5:e4:71:2e:c3:fc:96:d3:bd:f5:05:72
TLSv1
192.168.56.102:49170
171.103.187.218:449
ST=none ST=none f7:5a:a2:97:54:74:9a:70:68:70:a3:3f:94:72:bd:3d:aa:8e:4b:45
TLSv1
192.168.56.102:49174
186.4.193.75:443
C=NE, ST=none, L=Comman, O=Beurret, CN=badan.ch/emailAddress=mccoybrianna@jackson-hodges.com C=NE, ST=none, L=Comman, O=Beurret, CN=badan.ch/emailAddress=mccoybrianna@jackson-hodges.com 7d:cf:67:bf:06:62:f0:33:33:e5:7f:67:7d:85:dd:59:6c:92:1c:b5
TLSv1
192.168.56.102:49175
186.4.193.75:443
C=NE, ST=none, L=Comman, O=Beurret, CN=badan.ch/emailAddress=mccoybrianna@jackson-hodges.com C=NE, ST=none, L=Comman, O=Beurret, CN=badan.ch/emailAddress=mccoybrianna@jackson-hodges.com 7d:cf:67:bf:06:62:f0:33:33:e5:7f:67:7d:85:dd:59:6c:92:1c:b5
TLSv1
192.168.56.102:49176
171.103.187.218:449
ST=none ST=none f7:5a:a2:97:54:74:9a:70:68:70:a3:3f:94:72:bd:3d:aa:8e:4b:45
TLSv1
192.168.56.102:49177
171.103.187.218:449
ST=none ST=none f7:5a:a2:97:54:74:9a:70:68:70:a3:3f:94:72:bd:3d:aa:8e:4b:45
TLSv1
192.168.56.102:49178
171.103.187.218:449
ST=none ST=none f7:5a:a2:97:54:74:9a:70:68:70:a3:3f:94:72:bd:3d:aa:8e:4b:45

Snort Alerts

No Snort Alerts