NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.76.70.102 Active Moloch
129.151.210.129 Active Moloch
138.201.197.74 Active Moloch
149.154.167.220 Active Moloch
159.69.63.226 Active Moloch
164.124.101.2 Active Moloch
167.86.115.218 Active Moloch
185.189.159.121 Active Moloch
208.95.112.1 Active Moloch
5.181.12.94 Active Moloch
61.111.58.40 Active Moloch
65.21.49.163 Active Moloch
89.46.80.136 Active Moloch
GET 200 http://ip-api.com/line?fields=query,country
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
PUT 100 http://5.181.12.94/FMARE_test22%40TEST22-PC_report.wsr
REQUEST
RESPONSE
GET 200 http://r3.i.lencr.org/
REQUEST
RESPONSE
GET 200 http://x1.i.lencr.org/
REQUEST
RESPONSE
PUT 100 http://138.201.197.74:8080/FMARE_test22%40TEST22-PC_report.wsr
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.103:56613 -> 164.124.101.2:53 2033966 ET HUNTING Telegram API Domain in DNS Lookup Misc activity
TCP 149.154.167.220:443 -> 192.168.56.103:49182 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 149.154.167.220:443 2033967 ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) Misc activity
TCP 192.168.56.103:49182 -> 149.154.167.220:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49181 -> 138.201.197.74:8080 2045868 ET MALWARE [ANY.RUN] WhiteSnake Stealer Reporting Request (Outbound) Successful Credential Theft Detected
TCP 192.168.56.103:49175 -> 129.151.210.129:8082 2045868 ET MALWARE [ANY.RUN] WhiteSnake Stealer Reporting Request (Outbound) Successful Credential Theft Detected
TCP 192.168.56.103:49182 -> 149.154.167.220:443 2033967 ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) Misc activity
TCP 192.168.56.103:49185 -> 129.151.210.129:8082 2045868 ET MALWARE [ANY.RUN] WhiteSnake Stealer Reporting Request (Outbound) Successful Credential Theft Detected
TCP 192.168.56.103:49170 -> 159.69.63.226:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49177 -> 5.181.12.94:80 2045868 ET MALWARE [ANY.RUN] WhiteSnake Stealer Reporting Request (Outbound) Successful Credential Theft Detected
TCP 192.168.56.103:49171 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 192.168.56.103:49182 -> 149.154.167.220:443 2033967 ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) Misc activity

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49170
159.69.63.226:443
C=US, O=Let's Encrypt, CN=R3 CN=archive.torproject.org 46:76:9d:7a:fb:c3:cf:f3:94:13:39:40:2e:98:0c:2a:7a:3a:ff:f1
TLS 1.2
192.168.56.103:49178
89.46.80.136:443
C=US, O=Let's Encrypt, CN=R3 CN=transfer.fragnet.gg 14:fc:1d:17:5c:4b:36:16:b0:e2:f4:bc:bb:3f:64:68:ee:dc:39:ab

Snort Alerts

No Snort Alerts