NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
164.88.201.214 Active Moloch
3.1.17.18 Active Moloch
38.163.2.19 Active Moloch
45.33.6.223 Active Moloch
83.229.19.64 Active Moloch
GET 404 http://www.lokoua.com/ehix/?h6F=J3/YmHeO7gb1hrFZ00oJyvMIE8jwh9FpyhpNHHKc/Dwl4Ow066XTIPDrbjScBfSdD+Wjc5kJZlXqKPUymTpi8Jn7Vm98ECa7tDgcZOQ=&YYr=-RbSCSO-GYg_Y3Y
REQUEST
RESPONSE
GET 200 http://www.sqlite.org/2017/sqlite-dll-win32-x86-3190000.zip
REQUEST
RESPONSE
POST 200 http://www.dinggubd.net/ehix/
REQUEST
RESPONSE
GET 200 http://www.dinggubd.net/ehix/?h6F=uZpwbE4nN2FTslKaVHbKae8zgt7ky0ornocOgs3KDnesGtSB9h/P9vAZ6XnbrtyGeAsuVYTjH2sIgvdhXFnX0MFN/kXYYsd1fLs/H40=&YYr=-RbSCSO-GYg_Y3Y
REQUEST
RESPONSE
POST 200 http://www.concuahuhong1.click/ehix/
REQUEST
RESPONSE
GET 200 http://www.concuahuhong1.click/ehix/?h6F=if2Sxmb1wbsgykDYswU7cz6QUuf80YrLHLWXtXfRIc3fuRnAOAgdB9sWkF8Vm7Dtou8EjpxeY5RMTtGuXYR0sZRmFMzKh58Rimf7prg=&YYr=-RbSCSO-GYg_Y3Y
REQUEST
RESPONSE
POST 404 http://www.sandpiper-apts.com/ehix/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 164.88.201.214:80 -> 192.168.56.101:49177 2400014 ET DROP Spamhaus DROP Listed Traffic Inbound group 15 Misc Attack
TCP 192.168.56.101:49169 -> 83.229.19.64:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49169 -> 83.229.19.64:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49169 -> 83.229.19.64:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49174 -> 3.1.17.18:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49174 -> 3.1.17.18:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49174 -> 3.1.17.18:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49172 -> 38.163.2.19:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49172 -> 38.163.2.19:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49172 -> 38.163.2.19:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts