NetWork | ZeroBOX

Network Analysis

IP Address Status Action
147.189.170.192 Active Moloch
164.124.101.2 Active Moloch
Name Response Post-Analysis Lookup
wbem.ddns.net 147.189.170.192

No traffic

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.102:63709 -> 164.124.101.2:53 2028675 ET POLICY DNS Query to DynDNS Domain *.ddns .net Potentially Bad Traffic
TCP 147.189.170.192:6666 -> 192.168.56.102:49163 2030673 ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) Domain Observed Used for C2 Detected
TCP 147.189.170.192:6666 -> 192.168.56.102:49165 2030673 ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) Domain Observed Used for C2 Detected
TCP 147.189.170.192:6666 -> 192.168.56.102:49163 2035595 ET MALWARE Generic AsyncRAT Style SSL Cert Domain Observed Used for C2 Detected
TCP 147.189.170.192:6666 -> 192.168.56.102:49165 2035595 ET MALWARE Generic AsyncRAT Style SSL Cert Domain Observed Used for C2 Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49163
147.189.170.192:6666
CN=AsyncRAT Server CN=AsyncRAT Server 33:ca:ec:34:b4:66:16:1b:6e:4d:7a:f2:38:5a:35:d1:e6:40:2d:50
TLSv1
192.168.56.102:49165
147.189.170.192:6666
CN=AsyncRAT Server CN=AsyncRAT Server 33:ca:ec:34:b4:66:16:1b:6e:4d:7a:f2:38:5a:35:d1:e6:40:2d:50

Snort Alerts

No Snort Alerts