NetWork | ZeroBOX

Network Analysis

IP Address Status Action
103.97.178.89 Active Moloch
107.151.204.57 Active Moloch
164.124.101.2 Active Moloch
58.250.136.113 Active Moloch
Name Response Post-Analysis Lookup
users.qzone.qq.com 58.250.136.113
GET 200 https://users.qzone.qq.com/fcg-bin/cgi_get_portrait.fcg?uins=12345678
REQUEST
RESPONSE
GET 200 https://users.qzone.qq.com/fcg-bin/cgi_get_portrait.fcg?uins=12345678
REQUEST
RESPONSE
GET 302 http://users.qzone.qq.com/fcg-bin/cgi_get_portrait.fcg?uins=12345678
REQUEST
RESPONSE
GET 302 http://users.qzone.qq.com/fcg-bin/cgi_get_portrait.fcg?uins=12345678
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49168 -> 58.250.136.113:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49162 -> 107.151.204.57:9985 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 107.151.204.57:9985 -> 192.168.56.101:49162 2045860 ET HUNTING Rejetto HTTP File Sever Response A Network Trojan was detected
TCP 192.168.56.101:49172 -> 58.250.136.113:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49168
58.250.136.113:443
C=US, O=DigiCert Inc, CN=DigiCert Secure Site CN CA G3 C=CN, ST=Guangdong Province, L=Shenzhen, O=Shenzhen Tencent Computer Systems Company Limited, CN=*.qzone.qq.com 95:32:d9:7d:91:4a:63:96:66:10:b3:ab:36:27:f3:23:ab:62:48:32
TLSv1
192.168.56.101:49172
58.250.136.113:443
None None None

Snort Alerts

No Snort Alerts