NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
185.181.104.242 Active Moloch
3.33.152.147 Active Moloch
31.186.11.254 Active Moloch
34.102.136.180 Active Moloch
GET 200 http://www.foreverenamored.com/s27k/?mzr4=K0JmOqXr9HCtj2qTWz3wm1ISclVIfppkL5EMoSSMyzeFhY/mEgvox6BxsSrLYXaYq3j87tFB&Ulm=1bVHT
REQUEST
RESPONSE
GET 403 http://www.leaffonly.com/s27k/?mzr4=pW37V/wDdSqrMpF5ldchVc6r7Ddh2sY8bFEqKAvZO/A4bpL2AchokubKXEqi/NpFzOeyX4rN&Ulm=1bVHT
REQUEST
RESPONSE
GET 403 http://www.happyhedgehogpress.com/s27k/?mzr4=a2nlmsvFJPfX3VFlu+jfFNID+dUFrRaa9nceP0cgqTTsgglWoa+YQxHQjSPpl/c00euLIa3j&Ulm=1bVHT
REQUEST
RESPONSE
GET 403 http://www.flippinyourbusiness.com/s27k/?mzr4=Xi7F+l4Lb4Vq+ZnK/97dtmej1UbPO7AQVB5jWoV3FA39X8wswabFceq/socQVQQl0jUSsZ5z&Ulm=1bVHT
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49170 -> 34.102.136.180:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49172 -> 34.102.136.180:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49166 -> 31.186.11.254:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49166 -> 31.186.11.254:80 2031088 ET HUNTING Request to .XYZ Domain with Minimal Headers Potentially Bad Traffic
TCP 192.168.56.101:49167 -> 185.181.104.242:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49168 -> 3.33.152.147:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts