NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.75.21.121 Active Moloch
121.254.136.16 Active Moloch
164.124.101.2 Active Moloch
192.229.232.200 Active Moloch
23.201.36.112 Active Moloch
23.201.37.168 Active Moloch
47.254.184.183 Active Moloch
34.117.59.81 Active Moloch
HEAD 200 https://download.microsoft.com/download/b/9/5/b95136c0-58a0-48df-821a-d05319a86852/enu_NETFX/amd64_netfx_full_mzz/netfx_full_cab.exe
REQUEST
RESPONSE
HEAD 200 https://download.visualstudio.microsoft.com/download/pr/7db06743-abf0-4a85-a9d3-5af54b6cabcc/cc8282475d16202c4dca707e83cf0ae0/netfx_full_x64.msi
REQUEST
RESPONSE
GET 0 https://download.visualstudio.microsoft.com/download/pr/7db06743-abf0-4a85-a9d3-5af54b6cabcc/cc8282475d16202c4dca707e83cf0ae0/netfx_full_x64.msi
REQUEST
RESPONSE
HEAD 0 https://download.visualstudio.microsoft.com/download/pr/887938c3-2a46-4069-a0b1-207035f1dd82/61ef25faf2ae00460f6a77e29327699a/netfx_patch_x64.msp
REQUEST
RESPONSE
GET 0 https://download.visualstudio.microsoft.com/download/pr/887938c3-2a46-4069-a0b1-207035f1dd82/61ef25faf2ae00460f6a77e29327699a/netfx_patch_x64.msp
REQUEST
RESPONSE
HEAD 0 https://download.visualstudio.microsoft.com/download/pr/887938c3-2a46-4069-a0b1-207035f1dd82/f0771dabc43ba46cfe9e3481840a7944/windows6.1-kb4019990-x64.cab
REQUEST
RESPONSE
GET 0 https://download.visualstudio.microsoft.com/download/pr/887938c3-2a46-4069-a0b1-207035f1dd82/f0771dabc43ba46cfe9e3481840a7944/windows6.1-kb4019990-x64.cab
REQUEST
RESPONSE
HEAD 0 https://download.visualstudio.microsoft.com/download/pr/375f6a02-34bc-4b7d-ad8b-957789cf81e8/e4abafc291524af6e2b478f5d4857f0a/netfx_full_x64.msi
REQUEST
RESPONSE
GET 0 https://download.visualstudio.microsoft.com/download/pr/375f6a02-34bc-4b7d-ad8b-957789cf81e8/e4abafc291524af6e2b478f5d4857f0a/netfx_full_x64.msi
REQUEST
RESPONSE
HEAD 200 http://indug.com/68.exe
REQUEST
RESPONSE
GET 200 http://indug.com/68.exe
REQUEST
RESPONSE
GET 200 http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
REQUEST
RESPONSE
GET 200 http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl
REQUEST
RESPONSE
GET 200 http://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl
REQUEST
RESPONSE
HEAD 302 http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net472Rel1&plcid=0x409&clcid=0x409&ar=03062.00&sar=amd64&o1=netfx_Full.mzz
REQUEST
RESPONSE
GET 302 http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net472Rel1&plcid=0x409&clcid=0x409&ar=03062.00&sar=amd64&o1=netfx_Full.mzz
REQUEST
RESPONSE
HEAD 302 http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net472Rel1&plcid=0x409&clcid=0x409&ar=03062.00&sar=amd64&o1=netfx_Full_x64.msi
REQUEST
RESPONSE
GET 302 http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net472Rel1&plcid=0x409&clcid=0x409&ar=03062.00&sar=amd64&o1=netfx_Full_x64.msi
REQUEST
RESPONSE
GET 200 http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
REQUEST
RESPONSE
GET 200 http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
REQUEST
RESPONSE
GET 200 http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
REQUEST
RESPONSE
GET 200 http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
REQUEST
RESPONSE
HEAD 302 http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net472Rel1&plcid=0x409&clcid=0x409&ar=03081.00&sar=amd64&o1=netfx_Patch_x64.msp
REQUEST
RESPONSE
GET 302 http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net472Rel1&plcid=0x409&clcid=0x409&ar=03081.00&sar=amd64&o1=netfx_Patch_x64.msp
REQUEST
RESPONSE
HEAD 302 http://go.microsoft.com/fwlink/?LinkId=862008
REQUEST
RESPONSE
GET 302 http://go.microsoft.com/fwlink/?LinkId=862008
REQUEST
RESPONSE
HEAD 302 http://go.microsoft.com/fwlink/?LinkId=249120&clcid=0x409
REQUEST
RESPONSE
GET 302 http://go.microsoft.com/fwlink/?LinkId=249120&clcid=0x409
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

Command Params Type
CONNECT %s:%i HTTP/1.1 client

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49172 -> 47.254.184.183:80 2022482 ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01 A Network Trojan was detected
TCP 47.254.184.183:80 -> 192.168.56.103:49172 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 47.254.184.183:80 -> 192.168.56.103:49172 2021954 ET MALWARE JS/Nemucod.M.gen downloading EXE payload A Network Trojan was detected
TCP 47.254.184.183:80 -> 192.168.56.103:49172 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49188 -> 23.201.36.112:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49193 -> 192.229.232.200:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49188
23.201.36.112:443
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 02 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, OU=Microsoft Corporation, CN=download.microsoft.com 07:84:e3:73:a7:c0:23:a1:94:3b:48:8f:06:a3:1f:12:78:4a:73:99
TLSv1
192.168.56.103:49193
192.229.232.200:443
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=*.vo.msecnd.net 43:64:16:4b:73:33:82:e8:0f:a9:73:e6:cc:d5:11:b5:ee:fe:e3:4b

Snort Alerts

No Snort Alerts