NetWork | ZeroBOX

Network Analysis

IP Address Status Action
157.90.241.6 Active Moloch
162.0.222.121 Active Moloch
164.124.101.2 Active Moloch
GET 404 http://www.celimot.xyz/g2fg/?mtxhs=uSms+J8o1mIA6+wvZEfStnxeTJHxSsXMJcGf2ExRFCk7DrgbAjxC0fXMma/1S3JhdH+3q7pg&sPxL3H=mnRlt2QHpPdD
REQUEST
RESPONSE
GET 302 http://www.starfish.press/g2fg/?mtxhs=lWcjeiBloi4EDbg7MN3rvx7EqhokJu38Iq2Oe6cWJqEYyMwYkHsTTSC60+FG1O/0m2FzwNNs&sPxL3H=mnRlt2QHpPdD
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49170 -> 157.90.241.6:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49170 -> 157.90.241.6:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49170 -> 157.90.241.6:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49168 -> 162.0.222.121:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49168 -> 162.0.222.121:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49168 -> 162.0.222.121:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49168 -> 162.0.222.121:80 2031088 ET HUNTING Request to .XYZ Domain with Minimal Headers Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts