Network Analysis
IP Address | Status | Action |
---|---|---|
47.111.23.242 | Active | Moloch |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
GET
200
http://47.111.23.242/m.txt
REQUEST
RESPONSE
BODY
GET /m.txt HTTP/1.1
Accept: */*
Accept-Language: ko
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.2; .NET4.0C; .NET4.0E)
Host: 47.111.23.242
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 118784
Accept-Ranges: bytes
Server: HFS 2.3i
Set-Cookie: HFS_SID_=0.667281904723495; path=/; HttpOnly
Last-Modified: Fri, 18 Aug 2023 15:39:36 GMT
Content-Disposition: filename="m.txt";
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49161 -> 47.111.23.242:80 | 2034581 | ET HUNTING Terse Request for .txt - Likely Hostile | Potentially Bad Traffic |
TCP 47.111.23.242:80 -> 192.168.56.101:49161 | 2045860 | ET HUNTING Rejetto HTTP File Sever Response | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts