Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
divdemoce.duckdns.org | 192.30.89.67 | |
geoplugin.net | 178.237.33.50 | |
corpotechgroup.com | 162.213.196.78 |
- UDP Requests
-
-
192.168.56.102:56630 164.124.101.2:53
-
192.168.56.102:62846 164.124.101.2:53
-
192.168.56.102:63709 164.124.101.2:53
-
192.168.56.102:64513 164.124.101.2:53
-
192.168.56.102:137 192.168.56.103:137
-
192.168.56.102:137 192.168.56.255:137
-
192.168.56.102:138 192.168.56.255:138
-
192.168.56.102:49152 239.255.255.250:3702
-
192.168.56.102:56633 239.255.255.250:1900
-
52.231.114.183:123 192.168.56.102:123
-
GET
200
http://corpotechgroup.com/Wxdypod.png
REQUEST
RESPONSE
BODY
GET /Wxdypod.png HTTP/1.1
Host: corpotechgroup.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Connection: Keep-Alive
Keep-Alive: timeout=5, max=100
cache-control: public, max-age=604800
expires: Fri, 02 Jun 2023 08:46:45 GMT
content-type: image/png
last-modified: Thu, 25 May 2023 18:53:07 GMT
accept-ranges: bytes
content-length: 3946496
date: Fri, 26 May 2023 08:46:45 GMT
server: LiteSpeed
GET
200
http://geoplugin.net/json.gp
REQUEST
RESPONSE
BODY
GET /json.gp HTTP/1.1
Host: geoplugin.net
Cache-Control: no-cache
HTTP/1.1 200 OK
date: Fri, 26 May 2023 08:47:06 GMT
server: Apache
content-length: 948
content-type: application/json; charset=utf-8
cache-control: public, max-age=300
access-control-allow-origin: *
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.102:62846 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.102:62846 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
TCP 192.168.56.102:49168 -> 192.30.89.67:35639 | 2036594 | ET JA3 Hash - Remcos 3.x TLS Connection | Malware Command and Control Activity Detected |
TCP 192.168.56.102:49167 -> 192.30.89.67:35639 | 2036594 | ET JA3 Hash - Remcos 3.x TLS Connection | Malware Command and Control Activity Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.102:49168 192.30.89.67:35639 |
None | None | None |
TLS 1.3 192.168.56.102:49167 192.30.89.67:35639 |
None | None | None |
Snort Alerts
No Snort Alerts