NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
5.249.165.85 Active Moloch
Name Response Post-Analysis Lookup
davidmalik07.ddns.net 5.249.165.85

No traffic

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.103:52760 -> 164.124.101.2:53 2028675 ET POLICY DNS Query to DynDNS Domain *.ddns .net Potentially Bad Traffic
TCP 5.249.165.85:6666 -> 192.168.56.103:49164 2030673 ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) Domain Observed Used for C2 Detected
TCP 5.249.165.85:6666 -> 192.168.56.103:49164 2035595 ET MALWARE Generic AsyncRAT Style SSL Cert Domain Observed Used for C2 Detected
TCP 5.249.165.85:6666 -> 192.168.56.103:49163 2030673 ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) Domain Observed Used for C2 Detected
TCP 5.249.165.85:6666 -> 192.168.56.103:49163 2035595 ET MALWARE Generic AsyncRAT Style SSL Cert Domain Observed Used for C2 Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49164
5.249.165.85:6666
CN=AsyncRAT Server CN=AsyncRAT Server a4:7d:b8:e1:fd:fa:97:f2:8b:75:31:24:d1:b5:03:fe:7d:a5:96:dc
TLSv1
192.168.56.103:49163
5.249.165.85:6666
CN=AsyncRAT Server CN=AsyncRAT Server a4:7d:b8:e1:fd:fa:97:f2:8b:75:31:24:d1:b5:03:fe:7d:a5:96:dc

Snort Alerts

No Snort Alerts