NetWork | ZeroBOX

Network Analysis

IP Address Status Action
154.221.19.146 Active Moloch
157.240.215.16 Active Moloch
157.240.215.35 Active Moloch
164.124.101.2 Active Moloch
39.109.117.57 Active Moloch
GET 302 https://adsmanager.facebook.com/ads/manager/account_settings/account_billing/
REQUEST
RESPONSE
GET 200 https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F
REQUEST
RESPONSE
GET 200 http://us.imgjeoigaa.com/sts/imagc.jpg
REQUEST
RESPONSE
GET 200 http://as.imgjeoigaa.com/check/safe
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49163 -> 157.240.215.16:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49164 -> 157.240.215.35:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49165 -> 39.109.117.57:80 2003626 ET HUNTING Double User-Agent (User-Agent User-Agent) Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49163
157.240.215.16:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA C=US, ST=California, L=Menlo Park, O=Meta Platforms, Inc., CN=*.facebook.com 10:7c:33:90:44:c5:98:16:18:1d:8a:8b:52:5a:43:08:5f:fb:46:3a
TLSv1
192.168.56.103:49164
157.240.215.35:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA C=US, ST=California, L=Menlo Park, O=Meta Platforms, Inc., CN=*.facebook.com 10:7c:33:90:44:c5:98:16:18:1d:8a:8b:52:5a:43:08:5f:fb:46:3a

Snort Alerts

No Snort Alerts