NetWork | ZeroBOX

Network Analysis

IP Address Status Action
185.246.220.60 Active Moloch
45.159.188.66 Active Moloch
Name Response Post-Analysis Lookup
No hosts contacted.
GET 200 http://185.246.220.60/papizx.exe
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49162 -> 185.246.220.60:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.246.220.60:80 -> 192.168.56.101:49162 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 185.246.220.60:80 -> 192.168.56.101:49162 2014819 ET INFO Packed Executable Download Misc activity
TCP 185.246.220.60:80 -> 192.168.56.101:49162 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.246.220.60:80 -> 192.168.56.101:49162 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 185.246.220.60:80 -> 192.168.56.101:49162 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.101:49168
45.159.188.66:6893
C=XX, ST=N/A, L=N/A, O=Self-signed certificate, CN=45.159.188.66: Self-signed certificate C=XX, ST=N/A, L=N/A, O=Self-signed certificate, CN=45.159.188.66: Self-signed certificate 3b:fc:90:b0:5b:d0:cc:37:a6:05:cd:50:45:25:83:d3:df:78:90:a5
TLS 1.2
192.168.56.101:49167
45.159.188.66:6893
C=XX, ST=N/A, L=N/A, O=Self-signed certificate, CN=45.159.188.66: Self-signed certificate C=XX, ST=N/A, L=N/A, O=Self-signed certificate, CN=45.159.188.66: Self-signed certificate 3b:fc:90:b0:5b:d0:cc:37:a6:05:cd:50:45:25:83:d3:df:78:90:a5

Snort Alerts

No Snort Alerts