NetWork | ZeroBOX

Network Analysis

IP Address Status Action
107.174.71.176 Active Moloch
164.124.101.2 Active Moloch
172.217.175.238 Active Moloch
185.216.71.245 Active Moloch
20.112.52.29 Active Moloch
GET 200 http://rqiscogroup.me/j/j.jpg
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.102 172.217.175.238 8 abcdefghijklmnopqrstuvwabcdefghi
172.217.175.238 192.168.56.102 0 abcdefghijklmnopqrstuvwabcdefghi

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 185.216.71.245:4207 -> 192.168.56.102:49168 2038897 ET MALWARE Warzone RAT Response (Inbound) A Network Trojan was detected
TCP 185.216.71.245:4207 -> 192.168.56.102:49168 2038897 ET MALWARE Warzone RAT Response (Inbound) A Network Trojan was detected
TCP 185.216.71.245:4207 -> 192.168.56.102:49173 2038897 ET MALWARE Warzone RAT Response (Inbound) A Network Trojan was detected
TCP 185.216.71.245:4207 -> 192.168.56.102:49173 2038897 ET MALWARE Warzone RAT Response (Inbound) A Network Trojan was detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts