Network Analysis
IP Address | Status | Action |
---|---|---|
94.142.138.212 | Active | Moloch |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
- TCP Requests
No traffic
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49161 -> 94.142.138.212:11357 | 2043233 | ET INFO Microsoft net.tcp Connection Initialization Activity | Potentially Bad Traffic |
TCP 192.168.56.101:49161 -> 94.142.138.212:11357 | 2046045 | ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) | A Network Trojan was detected |
TCP 192.168.56.101:49161 -> 94.142.138.212:11357 | 2046105 | ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Outbound) | A Network Trojan was detected |
TCP 192.168.56.101:49161 -> 94.142.138.212:11357 | 2046105 | ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Outbound) | A Network Trojan was detected |
TCP 94.142.138.212:11357 -> 192.168.56.101:49161 | 2046056 | ET MALWARE Redline Stealer Activity (Response) | A Network Trojan was detected |
TCP 94.142.138.212:11357 -> 192.168.56.101:49161 | 2046106 | ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Response) | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts