Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
hata.co.za | 154.0.162.214 | |
jerenyankipong.duckdns.org | 129.232.18.35 |
GET
200
http://hata.co.za/iuy/join.pif
REQUEST
RESPONSE
BODY
GET /iuy/join.pif HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E)
Host: hata.co.za
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx
Date: Fri, 24 Dec 2021 03:49:42 GMT
Content-Length: 818248
Connection: keep-alive
Last-Modified: Thu, 23 Dec 2021 05:50:58 GMT
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
X-Nginx-Upstream-Cache-Status: EXPIRED
X-Server-Powered-By: nginx-ah
Accept-Ranges: bytes
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.101:55871 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
TCP 154.0.162.214:80 -> 192.168.56.101:49175 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 154.0.162.214:80 -> 192.168.56.101:49175 | 2022053 | ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts