NetWork | ZeroBOX

Network Analysis

IP Address Status Action
141.94.96.144 Active Moloch
141.94.96.195 Active Moloch
164.124.101.2 Active Moloch
51.77.140.74 Active Moloch
POST 200 http://51.77.140.74/api/endpoint.php
REQUEST
RESPONSE
POST 200 http://51.77.140.74/api/endpoint.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49164 -> 51.77.140.74:80 2044697 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M3 A Network Trojan was detected
TCP 192.168.56.103:49166 -> 51.77.140.74:80 2035420 ET MALWARE Win32/Pripyat Activity (POST) A Network Trojan was detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49163
141.94.96.195:9000
C=IT, ST=Pool, L=Daemon, O=Mining Pool, CN=mining.pool C=IT, ST=Pool, L=Daemon, O=Mining Pool, CN=mining.pool 53:ae:f7:96:12:17:eb:ad:26:1e:d7:46:d6:47:0b:e6:80:80:7b:02
TLS 1.2
192.168.56.103:49165
141.94.96.144:9000
C=IT, ST=Pool, L=Daemon, O=Mining Pool, CN=mining.pool C=IT, ST=Pool, L=Daemon, O=Mining Pool, CN=mining.pool d4:50:34:fd:7a:42:9b:53:4c:cb:38:ba:60:08:f3:a1:e1:df:f0:10

Snort Alerts

No Snort Alerts