Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
localbeheaders.mcgo.io | 108.16.60.193 | |
discord.com | 162.159.137.232 | |
ip-api.com | 208.95.112.1 |
POST
100
https://discord.com/api/webhooks/1056590206893051904/2ybdaA7zXHVKpVJNM5j-1a4lW_FhpBXMYcNGIJpTvJx-GQGX3887N8vX1I_ea-w62qoK
REQUEST
RESPONSE
BODY
POST /api/webhooks/1056590206893051904/2ybdaA7zXHVKpVJNM5j-1a4lW_FhpBXMYcNGIJpTvJx-GQGX3887N8vX1I_ea-w62qoK HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: discord.com
Content-Length: 141
Expect: 100-continue
Connection: Keep-Alive
HTTP/1.1 100 Continue
GET
200
http://ip-api.com/csv/?fields=status,query
REQUEST
RESPONSE
BODY
GET /csv/?fields=status,query HTTP/1.1
Host: ip-api.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Thu, 23 Mar 2023 09:29:12 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 24
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
ICMP traffic
Source | Destination | ICMP Type | Data |
---|---|---|---|
108.16.60.193 | 192.168.56.103 | 3 | |
108.16.60.193 | 192.168.56.103 | 3 | |
108.16.60.193 | 192.168.56.103 | 3 | |
108.16.60.193 | 192.168.56.103 | 3 | |
108.16.60.193 | 192.168.56.103 | 3 | |
108.16.60.193 | 192.168.56.103 | 3 | |
108.16.60.193 | 192.168.56.103 | 3 | |
108.16.60.193 | 192.168.56.103 | 3 | |
108.16.60.193 | 192.168.56.103 | 3 | |
108.16.60.193 | 192.168.56.103 | 3 | |
108.16.60.193 | 192.168.56.103 | 3 | |
108.16.60.193 | 192.168.56.103 | 3 |
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:50800 -> 164.124.101.2:53 | 2035465 | ET INFO Observed Discord Domain in DNS Lookup (discord .com) | Misc activity |
TCP 192.168.56.103:49163 -> 162.159.137.232:443 | 2035463 | ET INFO Observed Discord Domain (discord .com in TLS SNI) | Misc activity |
TCP 192.168.56.103:49163 -> 162.159.137.232:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49162 -> 208.95.112.1:80 | 2022082 | ET POLICY External IP Lookup ip-api.com | Device Retrieving External IP Address Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.103:49163 162.159.137.232:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | a3:ea:27:1a:3d:e8:8c:05:5e:1c:c8:1d:59:0e:d2:f2:a1:76:4d:2e |
Snort Alerts
No Snort Alerts