Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
pastebin.com | 104.20.67.143 | |
0.tcp.eu.ngrok.io | 3.125.102.39 | |
ip-api.com | 208.95.112.1 |
GET
0
https://pastebin.com/raw/fB4ZyQEn
REQUEST
RESPONSE
BODY
GET /raw/fB4ZyQEn HTTP/1.1
User-Agent: password
Host: pastebin.com
Connection: Keep-Alive
GET
200
http://ip-api.com/csv/?fields=status,query
REQUEST
RESPONSE
BODY
GET /csv/?fields=status,query HTTP/1.1
Host: ip-api.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Thu, 23 Mar 2023 09:24:56 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 24
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:64894 -> 164.124.101.2:53 | 2022642 | ET INFO DNS Query to a *.ngrok domain (ngrok.io) | Potential Corporate Privacy Violation |
TCP 192.168.56.103:49167 -> 172.67.34.170:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49169 -> 208.95.112.1:80 | 2022082 | ET POLICY External IP Lookup ip-api.com | Device Retrieving External IP Address Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.103:49167 172.67.34.170:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 73:48:5b:25:de:05:30:ba:9f:20:ba:6f:57:3d:cb:35:e9:86:ab:a8 |
Snort Alerts
No Snort Alerts