NetWork | ZeroBOX

Network Analysis

IP Address Status Action
148.251.234.93 Active Moloch
164.124.101.2 Active Moloch
168.119.239.218 Active Moloch
213.180.204.24 Active Moloch
5.101.152.100 Active Moloch
62.217.160.2 Active Moloch
66.225.201.117 Active Moloch
77.88.55.88 Active Moloch
GET 302 https://yandex.ru/
REQUEST
RESPONSE
GET 302 https://dzen.ru/?yredirect=true
REQUEST
RESPONSE
GET 200 https://sso.passport.yandex.ru/push?uuid=85d50709-205d-41dd-abfd-712b81bf467c&retpath=https%3A%2F%2Fdzen.ru%2F%3Fyredirect%3Dtrue
REQUEST
RESPONSE
GET 200 http://tokoi45.beget.tech/server.txt
REQUEST
RESPONSE
GET 200 http://tokoi45.beget.tech/server1.txt
REQUEST
RESPONSE
GET 200 http://tokoi45.beget.tech/server2.txt
REQUEST
RESPONSE
GET 301 http://formacioncontinua.com.mx/2/data64_1.exe
REQUEST
RESPONSE
GET 200 http://formacioncontinua.com.mx/2/data64_2.exe
REQUEST
RESPONSE
GET 200 http://formacioncontinua.com.mx/2/data64_3.exe
REQUEST
RESPONSE
GET 301 http://formacioncontinua.com.mx/2/data64_4.exe
REQUEST
RESPONSE
GET 301 http://formacioncontinua.com.mx/2/data64_5.exe
REQUEST
RESPONSE
GET 301 http://formacioncontinua.com.mx/2/data64_6.exe
REQUEST
RESPONSE
GET 200 http://formacioncontinua.com.mx/webArg2.txt
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.103 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 66.225.201.117:80 -> 192.168.56.103:49170 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 66.225.201.117:80 -> 192.168.56.103:49171 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.103:49177 -> 77.88.55.88:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49180 -> 62.217.160.2:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49186 -> 148.251.234.93:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 148.251.234.93:443 -> 192.168.56.103:49187 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49185 -> 148.251.234.93:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49181 -> 213.180.204.24:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49184 -> 168.119.239.218:36938 2043233 ET MALWARE RedLine Stealer TCP CnC net.tcp Init A Network Trojan was detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49177
77.88.55.88:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign ECC OV SSL CA 2018 C=RU, ST=Moscow, L=Moscow, O=Yandex LLC, CN=*.xn--d1acpjx3f.xn--p1ai e4:ba:b2:7f:bf:93:b8:22:10:26:70:37:9c:03:1a:9d:fb:23:17:24
TLSv1
192.168.56.103:49180
62.217.160.2:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign RSA OV SSL CA 2018 C=RU, ST=Moscow, L=Moscow, O=VK LLC, CN=*.dzen.ru 6a:31:14:29:60:07:c9:c6:17:7b:d1:27:ad:53:57:ec:d8:c1:d8:d2
TLSv1
192.168.56.103:49181
213.180.204.24:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign RSA OV SSL CA 2018 C=RU, ST=Moscow, L=Moscow, O=Yandex LLC, CN=sso.passport.yandex.ru f0:52:26:54:41:65:2b:6a:37:7b:c1:5b:de:9c:e9:d4:41:c6:81:2d

Snort Alerts

No Snort Alerts