NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
185.201.10.135 Active Moloch
51.210.64.36 Active Moloch
75.2.48.238 Active Moloch
POST 301 http://www.bikingforbalance.com/pufi/
REQUEST
RESPONSE
GET 301 http://www.bikingforbalance.com/pufi/?lZB=UFQL6PspYVB8cBA&mfsl7bO=Fr21o2VXwBHdUIjOGFad3q3JfXi6eFqQm7z8TVFYWCMh3a0MtFC07bKzhrbkd9snJ3U+/qpR
REQUEST
RESPONSE
POST 0 http://www.keepkalmm.com/pufi/
REQUEST
RESPONSE
GET 403 http://www.keepkalmm.com/pufi/?mfsl7bO=jpp0dRjJ7WPRoxr8J+a3vnsmVYkdai/17tP3ql/CPwKNulj4w8lUkhnoLA0Uff//tgaFGZrE&lZB=UFQL6PspYVB8cBA
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49181 -> 185.201.10.135:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49181 -> 185.201.10.135:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49181 -> 185.201.10.135:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49183 -> 75.2.48.238:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49183 -> 75.2.48.238:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49183 -> 75.2.48.238:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts