NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.18.19.218 Active Moloch
164.124.101.2 Active Moloch
172.67.160.221 Active Moloch
172.67.40.154 Active Moloch
176.113.115.145 Active Moloch
185.246.221.126 Active Moloch
193.233.20.36 Active Moloch
199.115.193.116 Active Moloch
212.87.204.93 Active Moloch
66.42.108.195 Active Moloch
45.33.6.223 Active Moloch
GET 200 https://bitcoin.org/bin/bitcoin-core-22.0/bitcoin-22.0-win64-setup.exe
REQUEST
RESPONSE
GET 200 https://download.electrum.org/4.3.4/electrum-4.3.4-setup.exe
REQUEST
RESPONSE
POST 200 http://193.233.20.36/joomla/index.php
REQUEST
RESPONSE
GET 200 http://193.233.20.36/lend/123dsss.exe
REQUEST
RESPONSE
POST 200 http://193.233.20.36/joomla/index.php
REQUEST
RESPONSE
GET 200 http://193.233.20.36/lend/Tarlatan.exe
REQUEST
RESPONSE
POST 200 http://193.233.20.36/joomla/index.php
REQUEST
RESPONSE
GET 200 http://193.233.20.36/lend/Gmeyad.exe
REQUEST
RESPONSE
POST 200 http://193.233.20.36/joomla/index.php
REQUEST
RESPONSE
GET 200 http://185.246.221.126/bins/2023.exe.exe
REQUEST
RESPONSE
POST 200 http://193.233.20.36/joomla/index.php
REQUEST
RESPONSE
GET 200 http://185.246.221.126/bins/w.exe
REQUEST
RESPONSE
POST 200 http://193.233.20.36/joomla/index.php
REQUEST
RESPONSE
GET 200 http://193.233.20.36/lend/tmpBEB8.tmp.exe
REQUEST
RESPONSE
POST 200 http://193.233.20.36/joomla/index.php
REQUEST
RESPONSE
GET 404 http://193.233.20.36/joomla/Plugins/cred64.dll
REQUEST
RESPONSE
GET 200 http://193.233.20.36/joomla/Plugins/clip64.dll
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49182 -> 193.233.20.36:80 2027700 ET MALWARE Amadey CnC Check-In Malware Command and Control Activity Detected
TCP 192.168.56.103:49182 -> 193.233.20.36:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 193.233.20.36:80 -> 192.168.56.103:49182 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 193.233.20.36:80 -> 192.168.56.103:49182 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 193.233.20.36:80 -> 192.168.56.103:49182 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 193.233.20.36:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 193.233.20.36:80 -> 192.168.56.103:49182 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 193.233.20.36:80 -> 192.168.56.103:49182 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 193.233.20.36:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 192.168.56.103:49190 -> 185.246.221.126:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 185.246.221.126:80 -> 192.168.56.103:49190 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.246.221.126:80 -> 192.168.56.103:49190 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.246.221.126:80 -> 192.168.56.103:49190 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49196 -> 104.18.19.218:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 104.18.19.218:443 -> 192.168.56.103:49197 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49199 -> 172.67.160.221:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49195 -> 104.18.19.218:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49182 -> 193.233.20.36:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 192.168.56.103:49182 -> 193.233.20.36:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 193.233.20.36:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49190 -> 185.246.221.126:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 192.168.56.103:49190 -> 185.246.221.126:80 2018581 ET MALWARE Single char EXE direct download likely trojan (multiple families) A Network Trojan was detected
TCP 192.168.56.103:49190 -> 185.246.221.126:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 192.168.56.103:49194 -> 172.67.40.154:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49199
172.67.160.221:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=*.electrum.org 76:1b:7b:1a:b2:a7:3f:c5:99:a7:2b:68:f5:fd:1b:a5:5e:97:4b:65
TLSv1
192.168.56.103:49194
172.67.40.154:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=*.bitcoin.org 1a:81:c6:0e:51:52:81:af:8a:1f:a8:fe:a3:18:04:fa:db:01:f5:3c

Snort Alerts

No Snort Alerts