NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.33.188 Active Moloch
111.90.146.149 Active Moloch
164.124.101.2 Active Moloch
172.67.130.202 Active Moloch
23.206.175.43 Active Moloch
3.17.66.208 Active Moloch
67.198.134.186 Active Moloch
98.126.176.51 Active Moloch
98.126.176.53 Active Moloch
99.86.144.74 Active Moloch
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://duzlwewk2uk96.cloudfront.net/vpn.exe
REQUEST
RESPONSE
GET 200 http://papwli.pw/adsli/note866.exe
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49177 -> 104.21.33.188:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49181 -> 99.86.144.74:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 99.86.144.74:80 -> 192.168.56.103:49181 2013414 ET POLICY Executable served from Amazon S3 Potentially Bad Traffic
TCP 99.86.144.74:80 -> 192.168.56.103:49181 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 99.86.144.74:80 -> 192.168.56.103:49181 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
UDP 192.168.56.103:50665 -> 164.124.101.2:53 2016778 ET DNS Query to a *.pw domain - Likely Hostile Potentially Bad Traffic
TCP 192.168.56.103:49225 -> 111.90.146.149:80 2022896 ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 A Network Trojan was detected
TCP 192.168.56.103:49225 -> 111.90.146.149:80 2016777 ET INFO HTTP Request to a *.pw domain Potentially Bad Traffic
TCP 111.90.146.149:80 -> 192.168.56.103:49225 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 111.90.146.149:80 -> 192.168.56.103:49225 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49177
104.21.33.188:443
C=US, O=Let's Encrypt, CN=R3 CN=*.boys4dayz.com 8d:a4:7e:14:c5:14:28:f1:07:04:40:07:c0:62:ff:97:67:34:d9:f0
TLS 1.2
192.168.56.103:49203
98.126.176.51:443
C=US, O=Let's Encrypt, CN=R3 CN=user.maskvpn.org 8e:d3:47:28:4d:1d:b8:e5:89:2b:2a:10:7c:3c:02:02:bf:f7:c0:f2
TLS 1.2
192.168.56.103:49199
98.126.176.53:443
C=US, O=Let's Encrypt, CN=R3 CN=vpn.maskvpn.org 8d:fc:00:5d:fb:42:74:9f:52:5d:29:51:ec:4c:6e:4d:c2:50:cc:f7
TLS 1.2
192.168.56.103:49202
98.126.176.51:443
C=US, O=Let's Encrypt, CN=R3 CN=user.maskvpn.org 8e:d3:47:28:4d:1d:b8:e5:89:2b:2a:10:7c:3c:02:02:bf:f7:c0:f2
TLS 1.2
192.168.56.103:49201
172.67.130.202:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com b6:f1:e6:a1:ab:bd:40:68:6a:f9:61:ea:fe:4d:f7:47:b6:74:b9:9f

Snort Alerts

No Snort Alerts