NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.18.11.207 Active Moloch
117.18.232.200 Active Moloch
164.124.101.2 Active Moloch
172.217.174.99 Active Moloch
172.217.31.138 Active Moloch
172.67.69.29 Active Moloch
175.208.134.152 Active Moloch
GET 200 https://malware.me/analysis/upload/
REQUEST
RESPONSE
GET 200 https://malware.me/static/css/main.css
REQUEST
RESPONSE
GET 200 https://malware.me/static/plugins/fontawesome-free/css/all.min.css
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/handlebars-templates.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/dist/css/adminlte.min.css
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/vendor.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/hexdump.js
REQUEST
RESPONSE
GET 200 https://maxcdn.bootstrapcdn.com/font-awesome/4.5.0/css/font-awesome.min.css
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/cuckoo/sticky.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/cuckoo/loader.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/cuckoo/analysis_sidebar.js
REQUEST
RESPONSE
GET 200 https://fonts.googleapis.com/css?family=Source+Sans+Pro:300,400,400i,700
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/cuckoo/recent.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/cuckoo/analysis_network.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/cuckoo/rdp.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/plugins/pace-progress/themes/black/pace-theme-flat-top.css
REQUEST
RESPONSE
GET 200 https://malware.me/img/profile/logo.png
REQUEST
RESPONSE
GET 200 https://malware.me/static/custom/css/screen_variablilty.css
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/cuckoo/submission.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/cuckoo/analysis_feedback.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/cuckoo/process_tree.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/js/cuckoo/app.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/plugins/toastr/toastr.min.css
REQUEST
RESPONSE
GET 200 https://malware.me/static/custom/js/jquery-1.11.0.min.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/custom/js/jquery-ui.min.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/lightslider/lightslider.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/lightslider/lightgallery-all.min.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/custom/js/datepicker-ko.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/plugins/bootstrap/js/bootstrap.bundle.min.js
REQUEST
RESPONSE
GET 200 https://maxcdn.bootstrapcdn.com/font-awesome/4.5.0/fonts/fontawesome-webfont.eot?
REQUEST
RESPONSE
GET 200 https://malware.me/static/dist/js/adminlte.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/plugins/pace-progress/pace.min.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/plugins/toastr/toastr.min.js
REQUEST
RESPONSE
GET 200 https://malware.me/static/fonts/Roboto_normal_300_default.woff
REQUEST
RESPONSE
GET 200 https://malware.me/static/fonts/Roboto_normal_400_default.woff
REQUEST
RESPONSE
GET 200 https://malware.me/static/fonts/Roboto_normal_500_default.woff
REQUEST
RESPONSE
GET 200 https://fonts.gstatic.com/s/sourcesanspro/v21/6xK1dSBYKcSV-LCoeQqfX1RYOo3qPZ7nsDQ.woff
REQUEST
RESPONSE
GET 0 https://fonts.gstatic.com/s/sourcesanspro/v21/6xKydSBYKcSV-LCoeQqfX1RYOo3ig4vwlxdo.woff
REQUEST
RESPONSE
GET 200 https://fonts.gstatic.com/s/sourcesanspro/v21/6xK3dSBYKcSV-LCoeQqfX1RYOo3qOK7j.woff
REQUEST
RESPONSE
GET 200 https://malware.me/static/fonts/Roboto_normal_700_default.woff
REQUEST
RESPONSE
GET 200 https://malware.me/static/fonts/Roboto_italic_400_default.woff
REQUEST
RESPONSE
GET 200 https://malware.me/static/fonts/fontawesome-webfont.eot?
REQUEST
RESPONSE
GET 200 https://malware.me/static/fonts/fa-solid-900.eot?
REQUEST
RESPONSE
GET 200 https://malware.me/static/fonts/fa-regular-400.eot?
REQUEST
RESPONSE
GET 200 https://malware.me/static/plugins/fontawesome-free/webfonts/fa-regular-400.eot?
REQUEST
RESPONSE
GET 200 https://malware.me/static/plugins/fontawesome-free/webfonts/fa-solid-900.eot?
REQUEST
RESPONSE
GET 200 https://malware.me/static/fonts/fa-light-300.eot?
REQUEST
RESPONSE
GET 200 https://malware.me/favicon.ico
REQUEST
RESPONSE
GET 200 https://malware.me/static/fonts/fa-brands-400.eot?
REQUEST
RESPONSE
GET 200 https://malware.me/static/plugins/fontawesome-free/webfonts/fa-brands-400.eot?
REQUEST
RESPONSE
GET 200 http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49165 -> 175.208.134.152:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49167 -> 175.208.134.152:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49170 -> 104.18.11.207:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49164 -> 175.208.134.152:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49172 -> 172.67.69.29:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49175 -> 172.67.69.29:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49177 -> 172.67.69.29:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49166 -> 175.208.134.152:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49173 -> 104.18.11.207:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49168 -> 175.208.134.152:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49171 -> 172.217.31.138:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49179 -> 172.67.69.29:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49169 -> 175.208.134.152:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49183 -> 172.217.174.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49184 -> 172.217.174.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49174 -> 172.217.31.138:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49186 -> 172.217.174.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 172.67.69.29:443 -> 192.168.56.101:49178 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49185 -> 172.217.174.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49187 -> 172.217.174.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49194 -> 117.18.232.200:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49193 -> 117.18.232.200:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 117.18.232.200:443 -> 192.168.56.101:49195 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49165
175.208.134.152:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=malware.me f6:c7:bd:58:f0:b0:3c:06:54:51:23:58:3a:8d:44:6c:bb:10:33:33
TLSv1
192.168.56.101:49167
175.208.134.152:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=malware.me f6:c7:bd:58:f0:b0:3c:06:54:51:23:58:3a:8d:44:6c:bb:10:33:33
TLSv1
192.168.56.101:49170
104.18.11.207:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 84:54:9b:cf:70:c9:dc:ed:ee:2c:a1:66:d9:e0:a0:1c:44:84:c6:e0
TLSv1
192.168.56.101:49164
175.208.134.152:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=malware.me f6:c7:bd:58:f0:b0:3c:06:54:51:23:58:3a:8d:44:6c:bb:10:33:33
TLSv1
192.168.56.101:49166
175.208.134.152:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=malware.me f6:c7:bd:58:f0:b0:3c:06:54:51:23:58:3a:8d:44:6c:bb:10:33:33
TLSv1
192.168.56.101:49173
104.18.11.207:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 84:54:9b:cf:70:c9:dc:ed:ee:2c:a1:66:d9:e0:a0:1c:44:84:c6:e0
TLSv1
192.168.56.101:49168
175.208.134.152:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=malware.me f6:c7:bd:58:f0:b0:3c:06:54:51:23:58:3a:8d:44:6c:bb:10:33:33
TLSv1
192.168.56.101:49171
172.217.31.138:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=upload.video.google.com 9d:91:e5:e1:fd:65:85:55:3c:84:3d:69:af:0a:bb:53:09:e3:cf:76
TLSv1
192.168.56.101:49169
175.208.134.152:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=malware.me f6:c7:bd:58:f0:b0:3c:06:54:51:23:58:3a:8d:44:6c:bb:10:33:33
TLSv1
192.168.56.101:49183
172.217.174.99:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.gstatic.com 46:50:7c:8c:68:c2:d3:c9:20:01:55:c1:df:91:f7:25:23:d3:5b:b1
TLSv1
192.168.56.101:49174
172.217.31.138:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=upload.video.google.com 9d:91:e5:e1:fd:65:85:55:3c:84:3d:69:af:0a:bb:53:09:e3:cf:76
TLSv1
192.168.56.101:49184
172.217.174.99:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.gstatic.com 46:50:7c:8c:68:c2:d3:c9:20:01:55:c1:df:91:f7:25:23:d3:5b:b1
TLSv1
192.168.56.101:49186
172.217.174.99:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.gstatic.com 46:50:7c:8c:68:c2:d3:c9:20:01:55:c1:df:91:f7:25:23:d3:5b:b1
TLSv1
192.168.56.101:49185
172.217.174.99:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.gstatic.com 46:50:7c:8c:68:c2:d3:c9:20:01:55:c1:df:91:f7:25:23:d3:5b:b1
TLSv1
192.168.56.101:49187
172.217.174.99:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.gstatic.com 46:50:7c:8c:68:c2:d3:c9:20:01:55:c1:df:91:f7:25:23:d3:5b:b1

Snort Alerts

No Snort Alerts