NetWork | ZeroBOX

Network Analysis

IP Address Status Action
103.27.32.22 Active Moloch
104.74.211.103 Active Moloch
164.124.101.2 Active Moloch
198.38.82.168 Active Moloch
GET 200 http://x1.i.lencr.org/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49175 -> 198.38.82.168:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49168 -> 198.38.82.168:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49170 -> 103.27.32.22:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49171 -> 103.27.32.22:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49170 -> 103.27.32.22:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49171 -> 103.27.32.22:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49170 -> 103.27.32.22:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49171 -> 103.27.32.22:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 103.27.32.22:443 -> 192.168.56.103:49170 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 103.27.32.22:443 -> 192.168.56.103:49170 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49172 -> 103.27.32.22:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49172 -> 103.27.32.22:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 103.27.32.22:443 -> 192.168.56.103:49172 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 103.27.32.22:443 -> 192.168.56.103:49172 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 103.27.32.22:443 -> 192.168.56.103:49171 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 103.27.32.22:443 -> 192.168.56.103:49171 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49175
198.38.82.168:443
C=US, O=Let's Encrypt, CN=R3 CN=denkyiraman.co.uk dc:ee:f4:0d:91:7f:f8:e9:35:0f:f7:e9:dc:0e:2d:e3:c5:4f:a1:e6
TLSv1
192.168.56.103:49168
198.38.82.168:443
C=US, O=Let's Encrypt, CN=R3 CN=*.giversherbalproducts.com 23:3b:89:a4:b8:b7:80:a5:bd:4b:5a:9e:b1:7b:1c:e9:82:57:a2:87

Snort Alerts

No Snort Alerts