NetWork | ZeroBOX

Network Analysis

IP Address Status Action
188.93.233.243 Active Moloch
164.124.101.2 Active Moloch
45.159.188.118 Active Moloch
85.209.135.109 Active Moloch
89.22.236.225 Active Moloch
Name Response Post-Analysis Lookup
ripple-wells-2022.net 188.93.233.243
POST 200 http://85.209.135.109/jg94cVd30f/index.php?scr=1
REQUEST
RESPONSE
POST 200 http://85.209.135.109/jg94cVd30f/index.php
REQUEST
RESPONSE
GET 200 http://ripple-wells-2022.net/n8exrcvvse1m2/Emit64.exe
REQUEST
RESPONSE
POST 200 http://85.209.135.109/jg94cVd30f/index.php
REQUEST
RESPONSE
GET 200 http://ripple-wells-2022.net/n8exrcvvse1m2/avicapn32.exe
REQUEST
RESPONSE
GET 200 http://45.159.188.118/bot/online?guid=test22-PC\test22&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
REQUEST
RESPONSE
GET 200 http://45.159.188.118/bot/regex?key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
REQUEST
RESPONSE
POST 200 http://85.209.135.109/jg94cVd30f/index.php
REQUEST
RESPONSE
GET 200 http://85.209.135.109/jg94cVd30f/Plugins/cred64.dll
REQUEST
RESPONSE
POST 200 http://85.209.135.109/jg94cVd30f/index.php
REQUEST
RESPONSE
POST 200 http://85.209.135.109/jg94cVd30f/index.php
REQUEST
RESPONSE
POST 200 http://85.209.135.109/jg94cVd30f/index.php
REQUEST
RESPONSE
POST 200 http://85.209.135.109/jg94cVd30f/index.php
REQUEST
RESPONSE
GET 200 http://45.159.188.118/bot/regex?key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49172 -> 85.209.135.109:80 2027700 ET MALWARE Amadey CnC Check-In Malware Command and Control Activity Detected
TCP 188.93.233.243:80 -> 192.168.56.103:49173 2014819 ET INFO Packed Executable Download Misc activity
TCP 188.93.233.243:80 -> 192.168.56.103:49173 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 188.93.233.243:80 -> 192.168.56.103:49173 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49180 -> 45.159.188.118:80 2024897 ET USER_AGENTS Go HTTP Client User-Agent Misc activity
TCP 192.168.56.103:49180 -> 45.159.188.118:80 2024897 ET USER_AGENTS Go HTTP Client User-Agent Misc activity
TCP 188.93.233.243:80 -> 192.168.56.103:49173 2014819 ET INFO Packed Executable Download Misc activity
TCP 192.168.56.103:49171 -> 85.209.135.109:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 85.209.135.109:80 -> 192.168.56.103:49171 2014819 ET INFO Packed Executable Download Misc activity
TCP 85.209.135.109:80 -> 192.168.56.103:49171 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 85.209.135.109:80 -> 192.168.56.103:49171 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49180 -> 45.159.188.118:80 2024897 ET USER_AGENTS Go HTTP Client User-Agent Misc activity
TCP 192.168.56.103:49180 -> 45.159.188.118:80 2024897 ET USER_AGENTS Go HTTP Client User-Agent Misc activity
TCP 188.93.233.243:80 -> 192.168.56.103:49173 2014819 ET INFO Packed Executable Download Misc activity

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts