NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
41.185.8.154 Active Moloch
45.9.74.141 Active Moloch
45.9.74.166 Active Moloch
5.42.65.67 Active Moloch
95.143.190.57 Active Moloch
POST 200 http://45.9.74.141/b7djSDcPcZ/index.php
REQUEST
RESPONSE
POST 200 http://45.9.74.166/b7djSDcPcZ/index.php
REQUEST
RESPONSE
GET 200 http://lobret.co.za/BRA.exe
REQUEST
RESPONSE
POST 200 http://45.9.74.141/b7djSDcPcZ/index.php
REQUEST
RESPONSE
GET 200 http://cat.lobret.co.za/sf64r.dll
REQUEST
RESPONSE
POST 200 http://45.9.74.141/b7djSDcPcZ/index.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49173 -> 45.9.74.141:80 2027700 ET MALWARE Amadey CnC Check-In Malware Command and Control Activity Detected
TCP 192.168.56.101:49173 -> 45.9.74.141:80 2045751 ET MALWARE Win32/Amadey Bot Activity (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49174 -> 45.9.74.166:80 2027700 ET MALWARE Amadey CnC Check-In Malware Command and Control Activity Detected
TCP 192.168.56.101:49174 -> 45.9.74.166:80 2045751 ET MALWARE Win32/Amadey Bot Activity (POST) M2 A Network Trojan was detected
TCP 41.185.8.154:80 -> 192.168.56.101:49175 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 41.185.8.154:80 -> 192.168.56.101:49175 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 41.185.8.154:80 -> 192.168.56.101:49180 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 41.185.8.154:80 -> 192.168.56.101:49180 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.101:49178 -> 45.9.74.141:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 95.143.190.57:15647 -> 192.168.56.101:49179 2029217 ET MALWARE Arechclient2 Backdoor CnC Init Malware Command and Control Activity Detected
TCP 192.168.56.101:49181 -> 45.9.74.141:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts