NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
210.116.108.238 Active Moloch
Name Response Post-Analysis Lookup
server.toeicswt.co.kr 210.116.108.238
POST 200 https://server.toeicswt.co.kr/update/update_global.asp
REQUEST
RESPONSE
POST 200 https://server.toeicswt.co.kr/update/download_file_global.asp
REQUEST
RESPONSE
POST 200 https://server.toeicswt.co.kr/update/download_file_global.asp
REQUEST
RESPONSE
POST 200 https://server.toeicswt.co.kr/update/download_file_global.asp
REQUEST
RESPONSE
POST 200 https://server.toeicswt.co.kr/update/download_file_global.asp
REQUEST
RESPONSE
POST 200 https://server.toeicswt.co.kr/update/download_file_global.asp
REQUEST
RESPONSE
POST 200 https://server.toeicswt.co.kr/update/download_file_global.asp
REQUEST
RESPONSE
POST 200 https://server.toeicswt.co.kr/update/download_file_global.asp
REQUEST
RESPONSE
POST 200 https://server.toeicswt.co.kr/update/download_file_global.asp
REQUEST
RESPONSE
POST 200 https://server.toeicswt.co.kr/update/download_file_global.asp
REQUEST
RESPONSE
POST 200 https://server.toeicswt.co.kr/svr_sjpt/server.asp
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49166 -> 210.116.108.238:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49164 -> 210.116.108.238:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49174 -> 210.116.108.238:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49178 -> 210.116.108.238:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49175 -> 210.116.108.238:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49179 -> 210.116.108.238:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49176 -> 210.116.108.238:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49171 -> 210.116.108.238:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49181 -> 210.116.108.238:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49186 -> 210.116.108.238:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49183 -> 210.116.108.238:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49166
210.116.108.238:443
None None None
TLSv1
192.168.56.101:49164
210.116.108.238:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign RSA OV SSL CA 2018 C=KR, ST=Gyeonggi-do, L=Seongnam-si, O=YBM NET, Inc., CN=*.ybmnet.co.kr 37:1d:7f:0b:90:fc:61:e4:4b:1d:c5:14:a0:48:2e:8d:cb:04:8f:51
TLSv1
192.168.56.101:49174
210.116.108.238:443
None None None
TLSv1
192.168.56.101:49178
210.116.108.238:443
None None None
TLSv1
192.168.56.101:49175
210.116.108.238:443
None None None
TLSv1
192.168.56.101:49179
210.116.108.238:443
None None None
TLSv1
192.168.56.101:49176
210.116.108.238:443
None None None
TLSv1
192.168.56.101:49171
210.116.108.238:443
None None None
TLSv1
192.168.56.101:49181
210.116.108.238:443
None None None
TLSv1
192.168.56.101:49186
210.116.108.238:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign RSA OV SSL CA 2018 C=KR, ST=Gyeonggi-do, L=Seongnam-si, O=YBM NET, Inc., CN=*.ybmnet.co.kr 37:1d:7f:0b:90:fc:61:e4:4b:1d:c5:14:a0:48:2e:8d:cb:04:8f:51
TLSv1
192.168.56.101:49183
210.116.108.238:443
None None None

Snort Alerts

No Snort Alerts