NetWork | ZeroBOX

Network Analysis

IP Address Status Action
13.107.42.13 Active Moloch
152.195.38.76 Active Moloch
164.124.101.2 Active Moloch
GET 301 http://onedrive.live.com/download?cid=4FE79169F14FE906&resid=4FE79169F14FE906%21197&authkey=AJx2lN6RUxuMay0
REQUEST
RESPONSE
GET 200 http://cacerts.digicert.com/DigiCertGlobalRootG2.crt
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49163 -> 13.107.42.13:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49163
13.107.42.13:443
C=US, O=Microsoft Corporation, CN=Microsoft Azure TLS Issuing CA 05 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=onedrive.com 4e:11:98:32:9d:ab:e8:3b:be:4e:e9:05:86:88:8d:67:16:9b:c0:9b

Snort Alerts

No Snort Alerts