NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.76.77 Active Moloch
164.124.101.2 Active Moloch
173.231.16.76 Active Moloch
POST 200 https://whyers.io/QWEwqdsvsf/ap.php
REQUEST
RESPONSE
GET 200 http://api.ipify.org/
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.103 224.0.0.22 8 ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI
192.168.56.103 224.0.0.22 8 ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI
192.168.56.103 224.0.0.22 8 ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI
192.168.56.103 224.0.0.22 8 ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI
192.168.56.103 239.255.255.250 8 ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI
192.168.56.103 239.255.255.250 8 ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI
192.168.56.103 239.255.255.250 8 ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI
192.168.56.103 239.255.255.250 8 ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49509 -> 104.21.76.77:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49508 -> 173.231.16.76:80 2021997 ET POLICY External IP Lookup api.ipify.org Device Retrieving External IP Address Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49509
104.21.76.77:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=whyers.io b5:70:31:dc:b0:cd:7d:e9:af:71:21:ec:4b:e6:97:ce:e4:da:a6:57

Snort Alerts

No Snort Alerts