NetWork | ZeroBOX

Network Analysis

IP Address Status Action
107.160.74.134 Active Moloch
142.250.207.65 Active Moloch
164.124.101.2 Active Moloch
OPTIONS 405 https://urlcallinghta6.blogspot.com/
REQUEST
RESPONSE
OPTIONS 405 https://urlcallinghta6.blogspot.com/
REQUEST
RESPONSE
GET 302 https://urlcallinghta6.blogspot.com/atom.xml
REQUEST
RESPONSE
OPTIONS 0 https://urlcallinghta6.blogspot.com/
REQUEST
RESPONSE
OPTIONS 405 https://urlcallinghta6.blogspot.com/
REQUEST
RESPONSE
GET 302 https://urlcallinghta6.blogspot.com/atom.xml
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49165 -> 142.250.207.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 107.160.74.134:443 -> 192.168.56.101:49170 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 107.160.74.134:443 -> 192.168.56.101:49176 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49174 -> 107.160.74.134:443 2038639 ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI) Potentially Bad Traffic
TCP 192.168.56.101:49168 -> 107.160.74.134:443 2038639 ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI) Potentially Bad Traffic
TCP 192.168.56.101:49174 -> 107.160.74.134:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49168 -> 107.160.74.134:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49168 -> 107.160.74.134:443 2038639 ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI) Potentially Bad Traffic
TCP 192.168.56.101:49174 -> 107.160.74.134:443 2038639 ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI) Potentially Bad Traffic
TCP 192.168.56.101:49166 -> 142.250.207.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49175 -> 107.160.74.134:443 2038639 ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI) Potentially Bad Traffic
TCP 192.168.56.101:49172 -> 142.250.207.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49175 -> 107.160.74.134:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49175 -> 107.160.74.134:443 2038639 ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI) Potentially Bad Traffic
TCP 192.168.56.101:49169 -> 107.160.74.134:443 2038639 ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI) Potentially Bad Traffic
TCP 192.168.56.101:49169 -> 107.160.74.134:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49169 -> 107.160.74.134:443 2038639 ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI) Potentially Bad Traffic
TCP 192.168.56.101:49173 -> 142.250.207.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49164 -> 142.250.207.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49175 -> 107.160.74.134:443 2038639 ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI) Potentially Bad Traffic
TCP 192.168.56.101:49168 -> 107.160.74.134:443 2038639 ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI) Potentially Bad Traffic
TCP 192.168.56.101:49174 -> 107.160.74.134:443 2038639 ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI) Potentially Bad Traffic
TCP 192.168.56.101:49169 -> 107.160.74.134:443 2038639 ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI) Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49163
142.250.207.65:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.googleusercontent.com b8:87:cf:d2:6d:98:e2:2e:5b:44:7a:3f:3e:38:c3:f0:33:eb:ce:ec
TLSv1
192.168.56.101:49165
142.250.207.65:443
None None None
TLSv1
192.168.56.101:49166
142.250.207.65:443
None None None
TLSv1
192.168.56.101:49172
142.250.207.65:443
None None None
TLSv1
192.168.56.101:49173
142.250.207.65:443
None None None
TLSv1
192.168.56.101:49164
142.250.207.65:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=misc-sni.blogspot.com e1:6e:2e:f1:e8:5e:50:35:06:ff:b0:c5:0b:a8:d8:8e:d7:46:a3:3b

Snort Alerts

No Snort Alerts