NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.192.141.1 Active Moloch
104.244.42.1 Active Moloch
164.124.101.2 Active Moloch
52.217.130.161 Active Moloch
88.99.75.82 Active Moloch
GET 302 https://bitbucket.org/setupfx1/software/downloads/Tango.bin
REQUEST
RESPONSE
GET 200 https://bbuseruploads.s3.amazonaws.com/dd8f3efb-aea4-4888-a2bc-db69074fc43e/downloads/f3cf9db5-402d-4ac0-81bf-ed03f37f3813/Tango.bin?Signature=saZRMEukgw4Kolbfgg8osLa73Hk%3D&Expires=1636364715&AWSAccessKeyId=AKIA6KOSE3BNJRRFUUX6&versionId=OQ.Ov51xs6RULvB9iL41ndXqzROZqFlU&response-content-disposition=attachment%3B%20filename%3D%22Tango.bin%22
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 104.244.42.1 8 abcdefghijklmnopqrstuvwabcdefghi
104.244.42.1 192.168.56.103 0 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.103 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49178 -> 52.217.130.161:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49182 -> 88.99.75.82:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.103:63183 -> 8.8.8.8:53 2027757 ET DNS Query for .to TLD Potentially Bad Traffic
TCP 192.168.56.103:49177 -> 104.192.141.1:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.103:63183 -> 164.124.101.2:53 2027757 ET DNS Query for .to TLD Potentially Bad Traffic
TCP 192.168.56.103:49181 -> 88.99.75.82:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 88.99.75.82:443 -> 192.168.56.103:49183 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49178
52.217.130.161:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Baltimore CA-2 G2 C=US, ST=Washington, L=Seattle, O=Amazon.com, Inc., CN=*.s3.amazonaws.com 90:e0:af:dc:fa:f7:0b:ac:50:bb:fa:43:e1:ec:e2:3d:ce:91:90:47
TLS 1.2
192.168.56.103:49177
104.192.141.1:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA unknown=Private Organization, unknown=US, unknown=Delaware, serialNumber=3928449, C=US, ST=California, L=San Francisco, O=Atlassian, Inc., OU=Bitbucket, CN=bitbucket.org 4e:6a:4c:3b:82:15:ef:df:97:38:5e:50:ef:b9:86:42:84:3b:89:f0

Snort Alerts

No Snort Alerts