NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.67.74.94 Active Moloch
192.185.35.70 Active Moloch
GET 403 http://www.jamnvibez.com/kzk9/?FrJd4VD=RD97+sYQI0XqiDdkgpzgSdWBYlciYaDFU1FGUcVBT4psxDAeA+lJB7BpU+r7Fjhs4LDiOT9/&Vnw0Z=-Z2h6rwPQ2dhNVd
REQUEST
RESPONSE
GET 301 http://www.fourwaira.com/kzk9/?FrJd4VD=jpbsMCdQcyIiRjwJxwpW4+ck0RmyGC3M4w6i6YV8jHR4vv9J5XguPad0A8kXdPUVZ76zsTs3&Vnw0Z=-Z2h6rwPQ2dhNVd
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49166 -> 172.67.74.94:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49166 -> 172.67.74.94:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49166 -> 172.67.74.94:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49167 -> 192.185.35.70:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49167 -> 192.185.35.70:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49167 -> 192.185.35.70:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts