Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | April 4, 2023, 7:10 a.m. | April 4, 2023, 7:14 a.m. |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 185.81.157.209:2301 -> 192.168.56.103:49163 | 2030673 | ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) | Domain Observed Used for C2 Detected |
TCP 185.81.157.209:2301 -> 192.168.56.103:49163 | 2035595 | ET MALWARE Generic AsyncRAT Style SSL Cert | Domain Observed Used for C2 Detected |
TCP 185.81.157.209:2301 -> 192.168.56.103:49165 | 2030673 | ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) | Domain Observed Used for C2 Detected |
TCP 185.81.157.209:2301 -> 192.168.56.103:49165 | 2035595 | ET MALWARE Generic AsyncRAT Style SSL Cert | Domain Observed Used for C2 Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49163 185.81.157.209:2301 |
CN=AsyncRAT Server | CN=AsyncRAT Server | c0:74:2f:cf:ac:08:26:95:4d:1f:b6:6f:1e:ab:22:b3:91:b1:75:90 |
TLSv1 192.168.56.103:49165 185.81.157.209:2301 |
CN=AsyncRAT Server | CN=AsyncRAT Server | c0:74:2f:cf:ac:08:26:95:4d:1f:b6:6f:1e:ab:22:b3:91:b1:75:90 |
host | 185.81.157.209 |