NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.26.12.31 Active Moloch
148.251.234.93 Active Moloch
164.124.101.2 Active Moloch
193.42.108.63 Active Moloch
193.42.110.84 Active Moloch
GET 200 https://api.ip.sb/ip
REQUEST
RESPONSE
GET 200 https://api.ip.sb/geoip
REQUEST
RESPONSE
GET 200 https://api.ip.sb/geoip
REQUEST
RESPONSE
GET 200 https://api.ip.sb/geoip
REQUEST
RESPONSE
GET 301 http://ilonamaska.info/wp-content/uploads/2021/10
REQUEST
RESPONSE
GET 200 http://ilonamaska.info/function/v2tmp/useruploadetfilesun.php
REQUEST
RESPONSE
GET 301 http://ilonamaska.info/books/userpaths/birbik/harrypotter1.txt
REQUEST
RESPONSE
GET 200 http://ilonamaska.info/app/files/ap/id27315001.php
REQUEST
RESPONSE
GET 301 http://ilonamaska.info/books/userpaths/birbik/harrypotter111.txt
REQUEST
RESPONSE
GET 200 http://ilonamaska.info/app/files/ap/id273150012.php
REQUEST
RESPONSE
GET 301 http://ilonamaska.info/books/userpaths/birbik/harrypotter1.txt
REQUEST
RESPONSE
GET 200 http://ilonamaska.info/app/files/ap/id27315001.php
REQUEST
RESPONSE
GET 301 http://ilonamaska.info/books/userpaths/birbik/harrypotter111.txt
REQUEST
RESPONSE
GET 200 http://ilonamaska.info/app/files/ap/id273150012.php
REQUEST
RESPONSE
GET 302 http://ilonamaska.info/stat_os.php
REQUEST
RESPONSE
GET 301 http://ilonamaska.info/wp-content/uploads/2022/08
REQUEST
RESPONSE
GET 200 http://ilonamaska.info/function/v2tmp/path_int.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49162 -> 193.42.108.63:80 2030880 ET USER_AGENTS Suspicious User-Agent (Installed OK) Potentially Bad Traffic
TCP 192.168.56.103:49162 -> 193.42.108.63:80 2030880 ET USER_AGENTS Suspicious User-Agent (Installed OK) Potentially Bad Traffic
TCP 193.42.108.63:80 -> 192.168.56.103:49162 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 193.42.108.63:80 -> 192.168.56.103:49162 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49167 -> 104.26.12.31:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49165 -> 104.26.12.31:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 193.42.108.63:80 -> 192.168.56.103:49168 2014819 ET INFO Packed Executable Download Misc activity
TCP 193.42.108.63:80 -> 192.168.56.103:49168 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 193.42.108.63:80 -> 192.168.56.103:49168 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49174 -> 148.251.234.93:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49177 -> 148.251.234.93:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 148.251.234.93:443 -> 192.168.56.103:49175 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 193.42.108.63:80 -> 192.168.56.103:49168 2014819 ET INFO Packed Executable Download Misc activity
TCP 193.42.108.63:80 -> 192.168.56.103:49168 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 193.42.108.63:80 -> 192.168.56.103:49168 2014819 ET INFO Packed Executable Download Misc activity
TCP 193.42.108.63:80 -> 192.168.56.103:49168 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49173 -> 148.251.234.93:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 148.251.234.93:443 -> 192.168.56.103:49179 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49168 -> 193.42.108.63:80 2030880 ET USER_AGENTS Suspicious User-Agent (Installed OK) Potentially Bad Traffic
TCP 192.168.56.103:49178 -> 148.251.234.93:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49167
104.26.12.31:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 8b:21:8f:0f:6e:2d:53:34:b7:d3:f5:58:58:99:01:63:93:81:e6:f1
TLSv1
192.168.56.103:49165
104.26.12.31:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 8b:21:8f:0f:6e:2d:53:34:b7:d3:f5:58:58:99:01:63:93:81:e6:f1

Snort Alerts

No Snort Alerts