Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
pingwiskot.com | 80.78.24.30 |
GET
200
http://pingwiskot.com/
REQUEST
RESPONSE
BODY
GET / HTTP/1.1
Connection: Keep-Alive
Cookie: __gads=2120215998:1:66:116; _gat=6.1.7601.64; _ga=1.591594.2020557398.103; _u=5445535432322D5043:746573743232:42304146374541464238424137354639; __io=21_3832866432_4053218753_3017428901; _gid=A4FE497CB1CB
Host: pingwiskot.com
HTTP/1.1 200 OK
Content-Type: text/plain; charset=utf-8
Date: Fri, 21 Apr 2023 23:56:05 GMT
Content-Length: 19
GET
200
http://pingwiskot.com/
REQUEST
RESPONSE
BODY
GET / HTTP/1.1
Connection: Keep-Alive
Cookie: __gads=2120215998:1:66:116; _gat=6.1.7601.64; _ga=1.591594.2020557398.103; _u=5445535432322D5043:746573743232:42304146374541464238424137354639; __io=21_3832866432_4053218753_3017428901; _gid=A4FE497CB1CB
Host: pingwiskot.com
HTTP/1.1 200 OK
Content-Type: text/plain; charset=utf-8
Date: Fri, 21 Apr 2023 23:57:05 GMT
Content-Length: 19
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49228 -> 80.78.24.30:80 | 2032086 | ET MALWARE Win32/IcedID Request Cookie | A Network Trojan was detected |
TCP 192.168.56.101:49224 -> 80.78.24.30:80 | 2032086 | ET MALWARE Win32/IcedID Request Cookie | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts