NetWork | ZeroBOX

Network Analysis

IP Address Status Action
103.237.169.99 Active Moloch
149.28.143.92 Active Moloch
164.124.101.2 Active Moloch
169.60.181.70 Active Moloch
182.162.143.56 Active Moloch
185.15.196.157 Active Moloch
187.63.160.88 Active Moloch
208.87.225.118 Active Moloch
23.43.165.105 Active Moloch
51.68.231.20 Active Moloch
91.187.140.35 Active Moloch
94.23.45.86 Active Moloch
95.217.221.146 Active Moloch
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://atici.net/old/PkZI74DD/
REQUEST
RESPONSE
GET 200 http://clanbaker.org/css/khhl7kT2n69n/
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.103 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49162 -> 103.237.169.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49166 -> 51.68.231.20:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 185.15.196.157:80 -> 192.168.56.103:49168 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.15.196.157:80 -> 192.168.56.103:49168 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 185.15.196.157:80 -> 192.168.56.103:49168 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49179 -> 182.162.143.56:443 2404308 ET CNC Feodo Tracker Reported CnC Server group 9 A Network Trojan was detected
TCP 192.168.56.103:49181 -> 169.60.181.70:8080 2404307 ET CNC Feodo Tracker Reported CnC Server group 8 A Network Trojan was detected
TCP 192.168.56.103:49189 -> 91.187.140.35:8080 2404323 ET CNC Feodo Tracker Reported CnC Server group 24 A Network Trojan was detected
TCP 182.162.143.56:443 -> 192.168.56.103:49183 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 91.187.140.35:8080 -> 192.168.56.103:49188 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49186 -> 149.28.143.92:443 2404305 ET CNC Feodo Tracker Reported CnC Server group 6 A Network Trojan was detected
TCP 192.168.56.103:49191 -> 187.63.160.88:80 2404310 ET CNC Feodo Tracker Reported CnC Server group 11 A Network Trojan was detected
TCP 187.63.160.88:80 -> 192.168.56.103:49192 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 182.162.143.56:443 -> 192.168.56.103:49180 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 91.187.140.35:8080 -> 192.168.56.103:49190 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 208.87.225.118:80 -> 192.168.56.103:49173 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 208.87.225.118:80 -> 192.168.56.103:49173 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 208.87.225.118:80 -> 192.168.56.103:49173 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 187.63.160.88:80 -> 192.168.56.103:49194 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49162
103.237.169.99:443
C=US, O=Let's Encrypt, CN=R3 CN=cs.com.sg 2a:49:94:e3:bb:32:6d:7a:61:e1:f0:5a:f7:d5:84:d7:05:8d:32:97
TLSv1
192.168.56.103:49166
51.68.231.20:443
C=US, O=Let's Encrypt, CN=R3 CN=j2ccamionmagasin.fr 6f:2f:b3:5c:68:ea:15:5f:43:8a:94:a0:6c:ca:f8:82:af:9f:07:79

Snort Alerts

No Snort Alerts