NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
78.155.222.151 Active Moloch
88.99.66.31 Active Moloch
195.2.93.45 Active Moloch
GET 200 https://iplogger.org/16twf7
REQUEST
RESPONSE
GET 200 https://iplogger.org/1ggL27
REQUEST
RESPONSE
GET 404 http://thisonecantbebanned.top/jollion/lipster.exe
REQUEST
RESPONSE
GET 200 http://thisonecantbebanned.top/moons/top.exe
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49171 -> 78.155.222.151:80 2008259 ET USER_AGENTS Suspicious User-Agent (AutoHotkey) A Network Trojan was detected
TCP 192.168.56.103:49171 -> 78.155.222.151:80 2022896 ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 A Network Trojan was detected
TCP 192.168.56.103:49171 -> 78.155.222.151:80 2023882 ET INFO HTTP Request to a *.top domain Potentially Bad Traffic
UDP 192.168.56.103:58465 -> 164.124.101.2:53 2023883 ET DNS Query to a *.top domain - Likely Hostile Potentially Bad Traffic
TCP 192.168.56.103:49170 -> 88.99.66.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 78.155.222.151:80 2008259 ET USER_AGENTS Suspicious User-Agent (AutoHotkey) A Network Trojan was detected
TCP 192.168.56.103:49172 -> 78.155.222.151:80 2022896 ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 A Network Trojan was detected
TCP 192.168.56.103:49172 -> 78.155.222.151:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 78.155.222.151:80 -> 192.168.56.103:49172 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 78.155.222.151:80 -> 192.168.56.103:49172 2023464 ET HUNTING Possible EXE Download From Suspicious TLD Misc activity

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49170
88.99.66.31:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.iplogger.org 55:1e:13:99:46:1c:67:40:a3:48:7f:38:0d:16:e7:51:f4:c4:43:cb

Snort Alerts

No Snort Alerts