NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
192.0.78.24 Active Moloch
192.185.174.18 Active Moloch
204.188.203.155 Active Moloch
23.88.111.156 Active Moloch
GET 200 http://advanced-ms.ml/n/Vnwayys_Nqgxigqk.bmp
REQUEST
RESPONSE
GET 404 http://www.mommoth.club/sn12/?nPnpM8=M1FrCRBfZI4URM1OR9+PPRBG9+ZjtDf1KcSpQBV/o5qXUsKvPLp9knFexYRpxxJTz8QEmRaD&Lh0h=ZTdp6Lqh8
REQUEST
RESPONSE
GET 302 http://www.xlblvd37.xyz/sn12/?nPnpM8=YM3GtV5qVLKpLRh+oYdy1+APxsbC0CfQN910FlDgY/N7Dk/bfVHsGC8BVqJyM7FpwOLWU+uU&Lh0h=ZTdp6Lqh8
REQUEST
RESPONSE
GET 301 http://www.thebeautifullifeofthearth.com/sn12/?nPnpM8=+bAqrraOPFP6G7VNldvEvmQlIsf6EpITHpJV0mplF4OII8J3s/Rhv2hUxoigmbYJPULf8A1w&Lh0h=ZTdp6Lqh8
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.103:51935 -> 164.124.101.2:53 2025106 ET INFO DNS Query for Suspicious .ml Domain Potentially Bad Traffic
TCP 192.168.56.103:49163 -> 192.185.174.18:80 2030384 ET HUNTING Suspicious Terse Request for .bmp Potentially Bad Traffic
TCP 192.168.56.103:49163 -> 192.185.174.18:80 2031091 ET HUNTING Request to .ML Domain with Minimal Headers Potentially Bad Traffic
TCP 192.168.56.103:49163 -> 192.185.174.18:80 2032988 ET INFO HTTP Request to a *.ml domain Potentially Bad Traffic
TCP 192.168.56.103:49168 -> 23.88.111.156:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49168 -> 23.88.111.156:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49168 -> 23.88.111.156:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49169 -> 204.188.203.155:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49169 -> 204.188.203.155:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49169 -> 204.188.203.155:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49169 -> 204.188.203.155:80 2031088 ET HUNTING Request to .XYZ Domain with Minimal Headers Potentially Bad Traffic
TCP 192.168.56.103:49170 -> 192.0.78.24:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49170 -> 192.0.78.24:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49170 -> 192.0.78.24:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts