NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
164.88.201.214 Active Moloch
38.163.2.19 Active Moloch
45.33.6.223 Active Moloch
52.76.101.124 Active Moloch
83.229.19.64 Active Moloch
GET 404 http://www.lokoua.com/ehix/?Fdu3T7=J3/YmHeO7gb1hrFZ00oJyvMIE8jwh9FpyhpNHHKc/Dwl4Ow066XTIPDrbjScBfSdD+Wjc5kJZlXqKPUymTpi8Jn7Vm98ECa7tDgcZOQ=&Oyh1=qgHWelcnGh26y
REQUEST
RESPONSE
GET 200 http://www.sqlite.org/2021/sqlite-dll-win32-x86-3360000.zip
REQUEST
RESPONSE
POST 200 http://www.dinggubd.net/ehix/
REQUEST
RESPONSE
GET 200 http://www.dinggubd.net/ehix/?Fdu3T7=uZpwbE4nN2FTslKaVHbKae8zgt7ky0ornocOgs3KDnesGtSB9h/P9vAZ6XnbrtyGeAsuVYTjH2sIgvdhXFnX0MFN/kXYYsd1fLs/H40=&Oyh1=qgHWelcnGh26y
REQUEST
RESPONSE
POST 200 http://www.concuahuhong1.click/ehix/
REQUEST
RESPONSE
GET 200 http://www.concuahuhong1.click/ehix/?Fdu3T7=if2Sxmb1wbsgykDYswU7cz6QUuf80YrLHLWXtXfRIc3fuRnAOAgdB9sWkF8Vm7Dtou8EjpxeY5RMTtGuXYR0sZRmFMzKh58Rimf7prg=&Oyh1=qgHWelcnGh26y
REQUEST
RESPONSE
POST 404 http://www.sandpiper-apts.com/ehix/
REQUEST
RESPONSE
GET 404 http://www.sandpiper-apts.com/ehix/?Fdu3T7=hKOCARu+DWiPhBy2OXBeEvuIeOvdbNydRa9l0pOJHQ6sKi3bem59mbFo0sLscCkUJvlKEmppatvAN8BVStPrPz5WppUEK8vG3JM0zT8=&Oyh1=qgHWelcnGh26y
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 164.88.201.214:80 -> 192.168.56.101:49178 2400014 ET DROP Spamhaus DROP Listed Traffic Inbound group 15 Misc Attack
TCP 192.168.56.101:49179 -> 164.88.201.214:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49179 -> 164.88.201.214:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49179 -> 164.88.201.214:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49173 -> 38.163.2.19:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49173 -> 38.163.2.19:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49173 -> 38.163.2.19:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49175 -> 52.76.101.124:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49175 -> 52.76.101.124:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49175 -> 52.76.101.124:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49170 -> 83.229.19.64:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49170 -> 83.229.19.64:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49170 -> 83.229.19.64:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts