Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
GET
200
http://79.137.202.29/bot/regex?key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
REQUEST
RESPONSE
BODY
GET /bot/regex?key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 HTTP/1.1
Host: 79.137.202.29
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx/1.18.0
Date: Sun, 28 May 2023 05:21:55 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 633
Connection: keep-alive
GET
200
http://79.137.202.29/bot/online?guid=TEST22-PC&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
REQUEST
RESPONSE
BODY
GET /bot/online?guid=TEST22-PC&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 HTTP/1.1
Host: 79.137.202.29
HTTP/1.1 200 OK
Server: nginx/1.18.0
Date: Sun, 28 May 2023 05:21:55 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 2
Connection: keep-alive
GET
200
http://79.137.202.29/bot/regex?key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
REQUEST
RESPONSE
BODY
GET /bot/regex?key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 HTTP/1.1
Host: 79.137.202.29
HTTP/1.1 200 OK
Server: nginx/1.18.0
Date: Sun, 28 May 2023 05:22:09 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 633
Connection: keep-alive
GET
200
http://79.137.202.29/bot/online?guid=TEST22-PC&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
REQUEST
RESPONSE
BODY
GET /bot/online?guid=TEST22-PC&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 HTTP/1.1
Host: 79.137.202.29
HTTP/1.1 200 OK
Server: nginx/1.18.0
Date: Sun, 28 May 2023 05:22:10 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 2
Connection: keep-alive
GET
200
http://79.137.202.29/bot/regex?key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
REQUEST
RESPONSE
BODY
GET /bot/regex?key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 HTTP/1.1
Host: 79.137.202.29
HTTP/1.1 200 OK
Server: nginx/1.18.0
Date: Sun, 28 May 2023 05:23:10 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 633
Connection: keep-alive
GET
200
http://79.137.202.29/bot/online?guid=TEST22-PC&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
REQUEST
RESPONSE
BODY
GET /bot/online?guid=TEST22-PC&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 HTTP/1.1
Host: 79.137.202.29
HTTP/1.1 200 OK
Server: nginx/1.18.0
Date: Sun, 28 May 2023 05:23:10 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 2
Connection: keep-alive
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49164 -> 79.137.202.29:80 | 2039775 | ET MALWARE Laplas Clipper - Regex CnC Request | A Network Trojan was detected |
TCP 192.168.56.103:49162 -> 79.137.202.29:80 | 2039775 | ET MALWARE Laplas Clipper - Regex CnC Request | A Network Trojan was detected |
TCP 192.168.56.103:49164 -> 79.137.202.29:80 | 2039776 | ET MALWARE Laplas Clipper - SetOnline CnC Checkin | A Network Trojan was detected |
TCP 192.168.56.103:49162 -> 79.137.202.29:80 | 2039776 | ET MALWARE Laplas Clipper - SetOnline CnC Checkin | A Network Trojan was detected |
TCP 192.168.56.103:49164 -> 79.137.202.29:80 | 2039775 | ET MALWARE Laplas Clipper - Regex CnC Request | A Network Trojan was detected |
TCP 192.168.56.103:49164 -> 79.137.202.29:80 | 2039776 | ET MALWARE Laplas Clipper - SetOnline CnC Checkin | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts