NetWork | ZeroBOX

Network Analysis

IP Address Status Action
103.90.233.128 Active Moloch
156.234.12.236 Active Moloch
164.124.101.2 Active Moloch
GET 500 http://www.hatdieuhoanglinhlinh.com/c1h5/?GVIp=U1bVErOKBwq0/qne9ly802VYsrPYaU3lSfk76VAFrq7s7GMJ2bTuzd8ISZ8Jn1imiGtcYMHa&uzu4=jjIDZjg0D0EpUr
REQUEST
RESPONSE
GET 403 http://www.8wngeu.icu/c1h5/?GVIp=zDGZ3vEmxGxSOsZI9fS37WtkChyhZfEo+Gn4TKgK29zc6+ut9iheeJAGbC/eRZmilZa7E+2d&uzu4=jjIDZjg0D0EpUr
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.103 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49164 -> 103.90.233.128:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49164 -> 103.90.233.128:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49164 -> 103.90.233.128:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
UDP 192.168.56.103:51958 -> 164.124.101.2:53 2026888 ET INFO DNS Query for Suspicious .icu Domain Potentially Bad Traffic
TCP 192.168.56.103:49165 -> 156.234.12.236:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49165 -> 156.234.12.236:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49165 -> 156.234.12.236:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts