NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.24.155 Active Moloch
150.95.255.38 Active Moloch
164.124.101.2 Active Moloch
81.169.145.161 Active Moloch
GET 404 http://www.suppershop.store/s6tn/?xPWD8pd=QVNpsJMpBgGpG2JQ0Dma4sDT8jrElQoz3HJVVEftfVLcCprd01Ik3hM1qAu4gTWMwVzvSFhh&9rjLtF=ffh4ZfOXa&sql=1
REQUEST
RESPONSE
POST 404 http://www.suppershop.store/s6tn/
REQUEST
RESPONSE
POST 404 http://www.suppershop.store/s6tn/
REQUEST
RESPONSE
GET 301 http://www.farmavidacanarias.com/s6tn/?xPWD8pd=xZ5e5Gm0aye54R3IRo2wNpzJIWEfB+XS0utdOciwVxaiHlnkTl1wePtzKhKfVUD9A8cyGpL+&9rjLtF=ffh4ZfOXa&sql=1
REQUEST
RESPONSE
POST 0 http://www.farmavidacanarias.com/s6tn/
REQUEST
RESPONSE
POST 0 http://www.farmavidacanarias.com/s6tn/
REQUEST
RESPONSE
GET 302 http://www.readingroomtnpasumo5.xyz/s6tn/?xPWD8pd=UpFxAwkrUGtFBYHGEM8uLvUidM4yAZ8dwTt6lP/3OYZhzoDiysclnIejmMVvklQrE9sL1AkC&9rjLtF=ffh4ZfOXa&sql=1
REQUEST
RESPONSE
POST 302 http://www.readingroomtnpasumo5.xyz/s6tn/
REQUEST
RESPONSE
POST 302 http://www.readingroomtnpasumo5.xyz/s6tn/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49168 -> 81.169.145.161:80 2031413 ET MALWARE FormBook CnC Checkin (POST) M2 Malware Command and Control Activity Detected
TCP 192.168.56.102:49174 -> 150.95.255.38:80 2031413 ET MALWARE FormBook CnC Checkin (POST) M2 Malware Command and Control Activity Detected
TCP 192.168.56.102:49171 -> 104.21.24.155:80 2031413 ET MALWARE FormBook CnC Checkin (POST) M2 Malware Command and Control Activity Detected
TCP 192.168.56.102:49170 -> 104.21.24.155:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49170 -> 104.21.24.155:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49170 -> 104.21.24.155:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49173 -> 150.95.255.38:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49173 -> 150.95.255.38:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49173 -> 150.95.255.38:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49173 -> 150.95.255.38:80 2031088 ET HUNTING Request to .XYZ Domain with Minimal Headers Potentially Bad Traffic
TCP 192.168.56.102:49167 -> 81.169.145.161:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49167 -> 81.169.145.161:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49167 -> 81.169.145.161:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts