NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.46.153 Active Moloch
164.124.101.2 Active Moloch
5.181.216.116 Active Moloch
62.182.156.152 Active Moloch
95.143.190.57 Active Moloch
77.91.68.63 Active Moloch
GET 200 https://africatechs.com/YoutubeAdvert.exe
REQUEST
RESPONSE
POST 200 http://62.182.156.152/so57Nst/index.php?scr=1
REQUEST
RESPONSE
POST 200 http://62.182.156.152/so57Nst/index.php
REQUEST
RESPONSE
GET 200 http://haisatatakarya.com/64.dll
REQUEST
RESPONSE
POST 200 http://62.182.156.152/so57Nst/index.php
REQUEST
RESPONSE
GET 301 http://africatechs.com/YoutubeAdvert.exe
REQUEST
RESPONSE
POST 200 http://62.182.156.152/so57Nst/index.php
REQUEST
RESPONSE
GET 200 http://62.182.156.152/so57Nst/Plugins/cred64.dll
REQUEST
RESPONSE
GET 200 http://62.182.156.152/so57Nst/Plugins/clip64.dll
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49173 -> 62.182.156.152:80 2027700 ET MALWARE Amadey CnC Check-In Malware Command and Control Activity Detected
TCP 192.168.56.103:49173 -> 62.182.156.152:80 2045751 ET MALWARE Win32/Amadey Bot Activity (POST) M2 A Network Trojan was detected
TCP 5.181.216.116:80 -> 192.168.56.103:49174 2014819 ET INFO Packed Executable Download Misc activity
TCP 5.181.216.116:80 -> 192.168.56.103:49174 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 5.181.216.116:80 -> 192.168.56.103:49174 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 95.143.190.57:15647 -> 192.168.56.103:49181 2029217 ET MALWARE Arechclient2 Backdoor CnC Init Malware Command and Control Activity Detected
TCP 192.168.56.103:49172 -> 62.182.156.152:80 2044597 ET MALWARE Amadey Bot Activity (POST) M1 A Network Trojan was detected
TCP 192.168.56.103:49172 -> 62.182.156.152:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49179 -> 104.21.46.153:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 62.182.156.152:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49172 -> 62.182.156.152:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 62.182.156.152:80 -> 192.168.56.103:49172 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 62.182.156.152:80 -> 192.168.56.103:49172 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49172 -> 62.182.156.152:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49179
104.21.46.153:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com b4:d4:31:ca:e7:af:db:25:ee:bd:ac:39:b6:7f:82:90:e4:8c:6e:11

Snort Alerts

No Snort Alerts