NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.192.2.242 Active Moloch
104.21.25.158 Active Moloch
160.153.129.228 Active Moloch
164.124.101.2 Active Moloch
185.106.92.214 Active Moloch
31.41.244.14 Active Moloch
31.41.244.188 Active Moloch
62.204.41.6 Active Moloch
POST 200 http://62.204.41.6/p9cWxH/index.php?scr=1
REQUEST
RESPONSE
POST 200 http://62.204.41.6/p9cWxH/index.php
REQUEST
RESPONSE
GET 200 http://31.41.244.188/lego/5jk29l2fg.exe
REQUEST
RESPONSE
POST 200 http://62.204.41.6/p9cWxH/index.php
REQUEST
RESPONSE
GET 302 http://www.time4unow.com/wp-content/file.exe
REQUEST
RESPONSE
GET 302 http://www.time4unow.com/wp-content/file.exe
REQUEST
RESPONSE
GET 302 http://www.time4unow.com/wp-content/file.exe
REQUEST
RESPONSE
POST 200 http://62.204.41.6/p9cWxH/index.php
REQUEST
RESPONSE
GET 200 http://31.41.244.188/miha/wish.exe
REQUEST
RESPONSE
POST 200 http://62.204.41.6/p9cWxH/index.php
REQUEST
RESPONSE
GET 200 http://31.41.244.188/new/linda5.exe
REQUEST
RESPONSE
POST 200 http://62.204.41.6/p9cWxH/index.php
REQUEST
RESPONSE
GET 200 http://31.41.244.188/ano/anon.exe
REQUEST
RESPONSE
POST 200 http://62.204.41.6/p9cWxH/index.php
REQUEST
RESPONSE
GET 200 http://byh.ajn322bb.com/files/pe/pb1109.exe
REQUEST
RESPONSE
GET 200 http://62.204.41.6/p9cWxH/Plugins/cred64.dll
REQUEST
RESPONSE
POST 200 http://62.204.41.6/p9cWxH/index.php
REQUEST
RESPONSE
POST 200 http://62.204.41.6/p9cWxH/index.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 62.204.41.6:80 -> 192.168.56.103:49163 2402000 ET DROP Dshield Block Listed Source group 1 Misc Attack
TCP 192.168.56.103:49164 -> 62.204.41.6:80 2027700 ET MALWARE Amadey CnC Check-In Malware Command and Control Activity Detected
TCP 192.168.56.103:49166 -> 31.41.244.188:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 31.41.244.188:80 -> 192.168.56.103:49166 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 31.41.244.188:80 -> 192.168.56.103:49166 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 31.41.244.188:80 -> 192.168.56.103:49166 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 160.153.129.228:443 -> 192.168.56.103:49176 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49173 -> 160.153.129.228:80 2021697 ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious A Network Trojan was detected
TCP 192.168.56.103:49174 -> 160.153.129.228:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49175 -> 160.153.129.228:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49180 -> 160.153.129.228:80 2021697 ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious A Network Trojan was detected
TCP 192.168.56.103:49181 -> 160.153.129.228:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49182 -> 160.153.129.228:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 160.153.129.228:443 -> 192.168.56.103:49183 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49185 -> 160.153.129.228:80 2021697 ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious A Network Trojan was detected
TCP 192.168.56.103:49187 -> 160.153.129.228:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49186 -> 160.153.129.228:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49190 -> 31.41.244.188:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 31.41.244.188:80 -> 192.168.56.103:49190 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 31.41.244.188:80 -> 192.168.56.103:49190 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 31.41.244.188:80 -> 192.168.56.103:49190 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49190 -> 31.41.244.188:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 31.41.244.188:80 -> 192.168.56.103:49190 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 31.41.244.188:80 -> 192.168.56.103:49190 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49190 -> 31.41.244.188:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 160.153.129.228:443 -> 192.168.56.103:49188 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49172 -> 62.204.41.6:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 62.204.41.6:80 -> 192.168.56.103:49172 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 62.204.41.6:80 -> 192.168.56.103:49172 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 104.21.25.158:80 -> 192.168.56.103:49198 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 104.21.25.158:80 -> 192.168.56.103:49198 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts