NetWork | ZeroBOX

Network Analysis

IP Address Status Action
142.250.204.36 Active Moloch
142.250.66.46 Active Moloch
162.0.210.44 Active Moloch
162.0.214.42 Active Moloch
162.255.117.78 Active Moloch
164.124.101.2 Active Moloch
192.243.59.13 Active Moloch
194.145.227.159 Active Moloch
52.217.161.205 Active Moloch
52.217.201.37 Active Moloch
POST 100 https://connectini.net/Series/SuperNitou.php
REQUEST
RESPONSE
POST 100 https://connectini.net/Series/Conumer4Publisher.php
REQUEST
RESPONSE
GET 200 https://connectini.net/Series/publisher/1/KR.json
REQUEST
RESPONSE
POST 100 https://connectini.net/Series/Conumer2kenpachi.php
REQUEST
RESPONSE
GET 200 https://connectini.net/Series/kenpachi/2/goodchannel/KR.json
REQUEST
RESPONSE
GET 200 https://connectini.net/Series/configPoduct/2/goodchannel.json
REQUEST
RESPONSE
GET 200 https://connectini.net/ip/check.php?duplicate=kenpachi2_registry_goodchannel_slava_inlogsoftware
REQUEST
RESPONSE
GET 200 https://connectini.net/ip/check.php?duplicate=kenpachi2_registry_goodchannel_installrox2_BumperWw
REQUEST
RESPONSE
GET 200 https://connectini.net/ip/check.php?duplicate=kenpachi2_registry_goodchannel_lylal_piyyyyWW
REQUEST
RESPONSE
GET 200 https://connectini.net/ip/check.php?duplicate=kenpachi2_registry_goodchannel_adxpertmedia_advancedmanager
REQUEST
RESPONSE
HEAD 200 http://safialinks.com/Installer_Provider/ShareFolder.exe
REQUEST
RESPONSE
GET 200 http://safialinks.com/Installer_Provider/ShareFolder.exe
REQUEST
RESPONSE
GET 200 http://safialinks.com/Widgets/FolderShare.exe
REQUEST
RESPONSE
GET 200 http://safialinks.com/xJRtjaHLw25uhP75sj4j5SDQa3dAyG/BestCPM/Soft_Manager_Cpm.exe
REQUEST
RESPONSE
GET 200 http://safialinks.com/xJRtjaHLw25uhP75sj4j5SDQa3dAyG/NetworkStreamer/UpdateStream_Provider.exe
REQUEST
RESPONSE
GET 200 http://safialinks.com/xJRtjaHLw25uhP75sj4j5SDQa3dAyG/Elmet7adi/Hand_conductor.exe
REQUEST
RESPONSE
POST 100 http://requestimedout.com/xenocrates/zoroaster
REQUEST
RESPONSE
GET 200 http://www.google.com/
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
POST 100 http://requestimedout.com/xenocrates/zoroaster
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.101 142.250.66.46 8 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
142.250.66.46 192.168.56.101 0 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49204 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.0.214.42:80 -> 192.168.56.101:49199 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 162.0.214.42:80 -> 192.168.56.101:49205 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 162.0.214.42:80 -> 192.168.56.101:49205 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 162.0.214.42:80 -> 192.168.56.101:49209 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 162.0.214.42:80 -> 192.168.56.101:49209 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 162.0.214.42:80 -> 192.168.56.101:49205 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.101:49225 -> 192.243.59.13:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.101:55629 -> 164.124.101.2:53 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related Potentially Bad Traffic
TCP 162.0.214.42:80 -> 192.168.56.101:49207 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.101:49226 -> 192.243.59.13:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.0.214.42:80 -> 192.168.56.101:49207 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.101:49218 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49239 -> 162.0.210.44:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49204
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf
TLSv1
192.168.56.101:49225
192.243.59.13:443
C=US, O=Let's Encrypt, CN=R3 CN=profitabletrustednetwork.com f6:6e:60:ea:2a:db:be:a8:de:83:15:6d:ed:6f:8a:17:77:20:36:46
TLSv1
192.168.56.101:49226
192.243.59.13:443
C=US, O=Let's Encrypt, CN=R3 CN=profitabletrustednetwork.com f6:6e:60:ea:2a:db:be:a8:de:83:15:6d:ed:6f:8a:17:77:20:36:46
TLSv1
192.168.56.101:49218
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf
TLSv1
192.168.56.101:49239
162.0.210.44:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf

Snort Alerts

No Snort Alerts