NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
79.137.195.205 Active Moloch
Name Response Post-Analysis Lookup
nerf-0148-unknown.guru 79.137.195.205
GET 200 http://nerf-0148-unknown.guru/bot/regex
REQUEST
RESPONSE
GET 200 http://nerf-0148-unknown.guru/bot/online?guid=TEST22-PC\\test22&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
REQUEST
RESPONSE
GET 200 http://nerf-0148-unknown.guru/bot/regex
REQUEST
RESPONSE
GET 200 http://nerf-0148-unknown.guru/bot/online?guid=TEST22-PC\\test22&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
REQUEST
RESPONSE
GET 200 http://nerf-0148-unknown.guru/bot/regex
REQUEST
RESPONSE
GET 200 http://nerf-0148-unknown.guru/bot/online?guid=TEST22-PC\\test22&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49165 -> 79.137.195.205:80 2039776 ET MALWARE Laplas Clipper - SetOnline CnC Checkin A Network Trojan was detected
TCP 192.168.56.103:49162 -> 79.137.195.205:80 2039776 ET MALWARE Laplas Clipper - SetOnline CnC Checkin A Network Trojan was detected
TCP 192.168.56.103:49165 -> 79.137.195.205:80 2039776 ET MALWARE Laplas Clipper - SetOnline CnC Checkin A Network Trojan was detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts