NetWork | ZeroBOX

Network Analysis

IP Address Status Action
185.213.208.196 Active Moloch
142.250.76.132 Active Moloch
142.250.76.142 Active Moloch
148.251.234.83 Active Moloch
151.115.10.1 Active Moloch
164.124.101.2 Active Moloch
173.233.137.36 Active Moloch
23.216.159.9 Active Moloch
23.43.165.105 Active Moloch
23.43.165.66 Active Moloch
37.230.138.123 Active Moloch
37.230.138.66 Active Moloch
52.219.170.66 Active Moloch

POST 100 https://connectini.net/Series/SuperNitouDisc.php
REQUEST
RESPONSE
GET 0 https://wewewe.s3.eu-central-1.amazonaws.com/WeUninstalled.exe
REQUEST
RESPONSE
GET 0 https://wewewe.s3.eu-central-1.amazonaws.com/WeUninstalled.exe
REQUEST
RESPONSE
GET 0 https://wewewe.s3.eu-central-1.amazonaws.com/WeUninstalled.exe
REQUEST
RESPONSE
GET 404 https://doll.s3.pl-waw.scw.cloud/widgets/powerOff.exe
REQUEST
RESPONSE
GET 404 https://doll.s3.pl-waw.scw.cloud/widgets/powerOff.exe
REQUEST
RESPONSE
GET 200 https://connectini.net/S2S/Disc/Disc.php?ezok=power2off2&tesla=8
REQUEST
RESPONSE
POST 100 https://connectini.net/Series/Conumer4Publisher.php
REQUEST
RESPONSE
GET 200 https://connectini.net/Series/publisher/1/KR.json
REQUEST
RESPONSE
POST 100 https://connectini.net/Series/Conumer2kenpachi.php
REQUEST
RESPONSE
GET 200 https://connectini.net/Series/kenpachi/2/goodchannel/KR.json
REQUEST
RESPONSE
GET 200 https://connectini.net/Series/configPoduct/2/goodchannel.json
REQUEST
RESPONSE
HEAD 200 http://160dd0af-5534-4369-972f-5aa0f99c9324.s3.pl-waw.scw.cloud/workflow/poweroff-1mo67u5vspq3.exe
REQUEST
RESPONSE
GET 200 http://160dd0af-5534-4369-972f-5aa0f99c9324.s3.pl-waw.scw.cloud/workflow/poweroff-1mo67u5vspq3.exe
REQUEST
RESPONSE
GET 200 http://nova-brothers.s3.pl-waw.scw.cloud/four-spoon/up-da-b135l0bjgejx.exe
REQUEST
RESPONSE
GET 200 http://nova-brothers.s3.pl-waw.scw.cloud/four-spoon/pub-b135l0bjgejx.exe
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://nova-brothers.s3.pl-waw.scw.cloud/four-spoon/hand-b135l0bjgejx.exe
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
POST 100 http://360devtracking.com/ezzcbmueaa4iwhvb/fmovies
REQUEST
RESPONSE
GET 200 http://www.google.com/
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
POST 100 http://360devtracking.com/ezzcbmueaa4iwhvb/fmovies
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.101 142.250.76.142 8 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
142.250.76.142 192.168.56.101 0 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
192.168.56.101 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.101:59002 -> 164.124.101.2:53 2027865 ET INFO Observed DNS Query to .cloud TLD Potentially Bad Traffic
UDP 192.168.56.101:55146 -> 164.124.101.2:53 2027865 ET INFO Observed DNS Query to .cloud TLD Potentially Bad Traffic
UDP 192.168.56.101:61950 -> 164.124.101.2:53 2027865 ET INFO Observed DNS Query to .cloud TLD Potentially Bad Traffic
TCP 192.168.56.101:49164 -> 151.115.10.1:80 2027874 ET INFO HTTP Request to Suspicious *.cloud Domain Potentially Bad Traffic
TCP 192.168.56.101:49167 -> 37.230.138.123:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49170 -> 151.115.10.1:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49169 -> 151.115.10.1:80 2027874 ET INFO HTTP Request to Suspicious *.cloud Domain Potentially Bad Traffic
UDP 192.168.56.101:53004 -> 164.124.101.2:53 2027865 ET INFO Observed DNS Query to .cloud TLD Potentially Bad Traffic
TCP 192.168.56.101:49171 -> 151.115.10.1:80 2027874 ET INFO HTTP Request to Suspicious *.cloud Domain Potentially Bad Traffic
TCP 192.168.56.101:49164 -> 151.115.10.1:80 2027874 ET INFO HTTP Request to Suspicious *.cloud Domain Potentially Bad Traffic
TCP 151.115.10.1:80 -> 192.168.56.101:49164 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.101:49173 -> 151.115.10.1:80 2027874 ET INFO HTTP Request to Suspicious *.cloud Domain Potentially Bad Traffic
TCP 151.115.10.1:80 -> 192.168.56.101:49169 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 151.115.10.1:80 -> 192.168.56.101:49169 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 151.115.10.1:80 -> 192.168.56.101:49171 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 151.115.10.1:80 -> 192.168.56.101:49171 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 151.115.10.1:80 -> 192.168.56.101:49173 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 151.115.10.1:80 -> 192.168.56.101:49173 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.101:49174 -> 151.115.10.1:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49215 -> 173.233.137.36:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49197 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49197 -> 148.251.234.83:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49197 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49199 -> 37.230.138.123:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49214 -> 173.233.137.36:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.101:52797 -> 164.124.101.2:53 2035948 ET POLICY IP Check Domain (iplogger .org in DNS Lookup) Potential Corporate Privacy Violation
UDP 192.168.56.101:52797 -> 8.8.8.8:53 2035948 ET POLICY IP Check Domain (iplogger .org in DNS Lookup) Potential Corporate Privacy Violation
TCP 192.168.56.101:49191 -> 142.250.76.132:80 2036303 ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check A Network Trojan was detected
TCP 192.168.56.101:49168 -> 52.219.170.66:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49196 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49196 -> 148.251.234.83:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49196 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49194 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49194 -> 148.251.234.83:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49194 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 148.251.234.83:443 -> 192.168.56.101:49198 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49193 -> 37.230.138.123:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49201 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49201 -> 148.251.234.83:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49201 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49201 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 148.251.234.83:443 -> 192.168.56.101:49178 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49178 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49178 -> 148.251.234.83:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49178 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49195 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49195 -> 148.251.234.83:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49195 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49195 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49201 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49194 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49178 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49196 -> 148.251.234.83:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49167
37.230.138.123:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com a9:58:92:78:d9:50:a8:fa:c0:a9:d2:11:99:c2:6d:53:0e:1f:6d:49
TLS 1.2
192.168.56.101:49170
151.115.10.1:443
C=US, O=Let's Encrypt, CN=R3 CN=s3.pl-waw.scw.cloud 13:5a:26:76:9b:02:b0:88:8d:ed:ac:89:e9:f3:d1:bd:f4:6d:ff:fd
TLS 1.2
192.168.56.101:49174
151.115.10.1:443
C=US, O=Let's Encrypt, CN=R3 CN=s3.pl-waw.scw.cloud 13:5a:26:76:9b:02:b0:88:8d:ed:ac:89:e9:f3:d1:bd:f4:6d:ff:fd
TLSv1
192.168.56.101:49215
173.233.137.36:443
C=US, O=Let's Encrypt, CN=R3 CN=profitabletrustednetwork.com 6a:48:45:b5:44:ae:75:f4:d2:b3:d4:5e:bc:2f:61:30:ec:d4:3a:99
TLSv1
192.168.56.101:49199
37.230.138.123:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com a9:58:92:78:d9:50:a8:fa:c0:a9:d2:11:99:c2:6d:53:0e:1f:6d:49
TLSv1
192.168.56.101:49214
173.233.137.36:443
C=US, O=Let's Encrypt, CN=R3 CN=profitabletrustednetwork.com 6a:48:45:b5:44:ae:75:f4:d2:b3:d4:5e:bc:2f:61:30:ec:d4:3a:99
TLS 1.2
192.168.56.101:49168
52.219.170.66:443
C=US, O=Amazon, OU=Server CA 1B, CN=Amazon CN=*.s3.eu-central-1.amazonaws.com bc:92:6b:62:48:5f:c5:08:60:03:a9:1e:bc:29:58:79:d7:4b:94:fb
TLSv1
192.168.56.101:49193
37.230.138.123:443
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com a9:58:92:78:d9:50:a8:fa:c0:a9:d2:11:99:c2:6d:53:0e:1f:6d:49

Snort Alerts

No Snort Alerts