NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
192.185.21.196 Active Moloch
35.206.99.234 Active Moloch
GET 404 http://www.haroldbrandon.com/rf3t/?Qzr=t+7/aGZMeVZ7qsEt5+4DmBD8HyUQSDbBqUHSzjReRbXHaiGlO3MURrtIfM/Rf2R0aEUe0WBN&MJBx=FdCxDn7P6z6LifAP
REQUEST
RESPONSE
GET 301 http://www.abouttohour.com/rf3t/?Qzr=dxabV5xweBKddW3hBDYDNLhqd7jg5/k4VAxBEzq92W65ij6GfsSmxJ7KJPHKVEBEKh4WCjoG&MJBx=FdCxDn7P6z6LifAP
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49168 -> 192.185.21.196:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49168 -> 192.185.21.196:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49168 -> 192.185.21.196:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49169 -> 35.206.99.234:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49169 -> 35.206.99.234:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49169 -> 35.206.99.234:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts