NetWork | ZeroBOX

Network Analysis

IP Address Status Action
148.251.234.93 Active Moloch
164.124.101.2 Active Moloch
172.67.223.30 Active Moloch
45.144.28.189 Active Moloch
GET 0 https://14mmf.za.com/analytics.php?pub=a03&guid=017bd04f-b3bf-45b6-8167-9e8f41ff87bf&sign=178004f0465ebfb5
REQUEST
RESPONSE
POST 200 http://45.144.28.189/
REQUEST
RESPONSE
GET 200 http://45.144.28.189/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/nss3.dll
REQUEST
RESPONSE
GET 200 http://45.144.28.189/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/msvcp140.dll
REQUEST
RESPONSE
GET 200 http://45.144.28.189/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/vcruntime140.dll
REQUEST
RESPONSE
GET 200 http://45.144.28.189/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue.dll
REQUEST
RESPONSE
GET 200 http://45.144.28.189/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/freebl3.dll
REQUEST
RESPONSE
GET 200 http://45.144.28.189/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/softokn3.dll
REQUEST
RESPONSE
GET 200 http://45.144.28.189/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/sqlite3.dll
REQUEST
RESPONSE
POST 200 http://45.144.28.189/302f831c3b8545fb0a5a60bd7a5eeedb
REQUEST
RESPONSE
POST 200 http://45.144.28.189/302f831c3b8545fb0a5a60bd7a5eeedb
REQUEST
RESPONSE
POST 200 http://45.144.28.189/302f831c3b8545fb0a5a60bd7a5eeedb
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.103 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 148.251.234.93:443 -> 192.168.56.103:49164 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49163 -> 148.251.234.93:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49161 -> 172.67.223.30:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49166 -> 45.144.28.189:80 2036934 ET MALWARE Win32/RecordBreaker CnC Checkin M1 A Network Trojan was detected
TCP 45.144.28.189:80 -> 192.168.56.103:49166 2036955 ET MALWARE Win32/RecordBreaker CnC Checkin - Server Response A Network Trojan was detected
TCP 192.168.56.103:49166 -> 45.144.28.189:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 45.144.28.189:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 45.144.28.189:80 -> 192.168.56.103:49166 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 45.144.28.189:80 -> 192.168.56.103:49167 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.103:49167 -> 45.144.28.189:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 45.144.28.189:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 45.144.28.189:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 45.144.28.189:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 45.144.28.189:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 45.144.28.189:80 2036884 ET HUNTING Possible Generic Stealer Sending System Information Misc activity
TCP 192.168.56.103:49167 -> 45.144.28.189:80 2036885 ET HUNTING Possible Generic Stealer Sending a Screenshot Misc activity

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49161
172.67.223.30:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=14mmf.za.com aa:41:3d:d8:cf:f6:f8:cf:3e:b5:c5:dd:03:65:99:87:f3:4f:f5:36

Snort Alerts

No Snort Alerts