Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
checkip.dyndns.org |
CNAME
checkip.dyndns.com
|
193.122.6.168 |
GET
200
http://107.172.4.169/09/Iksgu.bmp
REQUEST
RESPONSE
BODY
GET /09/Iksgu.bmp HTTP/1.1
Host: 107.172.4.169
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Sun, 12 Mar 2023 02:02:48 GMT
Server: Apache/2.4.54 (Win64) OpenSSL/1.1.1p PHP/8.0.25
Last-Modified: Fri, 10 Mar 2023 09:05:10 GMT
ETag: "1b3000-5f6880ef40b96"
Accept-Ranges: bytes
Content-Length: 1781760
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: image/bmp
GET
200
http://checkip.dyndns.org/
REQUEST
RESPONSE
BODY
GET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Sun, 12 Mar 2023 02:03:14 GMT
Content-Type: text/html
Content-Length: 107
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49161 -> 107.172.4.169:80 | 2030384 | ET HUNTING Suspicious Terse Request for .bmp | Potentially Bad Traffic |
UDP 192.168.56.101:59002 -> 164.124.101.2:53 | 2042687 | ET INFO DYNAMIC_DNS Query to a *.dyndns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.101:59002 -> 164.124.101.2:53 | 2012758 | ET INFO DYNAMIC_DNS Query to *.dyndns. Domain | Misc activity |
TCP 192.168.56.101:49167 -> 193.122.130.0:80 | 2039190 | ET MALWARE 404/Snake/Matiex Keylogger Style External IP Check | A Network Trojan was detected |
TCP 192.168.56.101:49167 -> 193.122.130.0:80 | 2021378 | ET POLICY External IP Lookup - checkip.dyndns.org | Device Retrieving External IP Address Detected |
TCP 192.168.56.101:49167 -> 193.122.130.0:80 | 2042688 | ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns .org Domain | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts