Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
mask-api.icloud.com | 17.248.221.64 |
- TCP Requests
-
-
192.168.56.101:49172 117.18.232.200:80
-
192.168.56.101:49174 117.18.232.200:443
-
192.168.56.101:49175 117.18.232.200:443
-
192.168.56.101:49176 117.18.232.200:443
-
192.168.56.101:49165 17.248.221.64:80mask-api.icloud.com
-
192.168.56.101:49166 17.248.221.64:443mask-api.icloud.com
-
192.168.56.101:49167 17.248.221.64:443mask-api.icloud.com
-
192.168.56.101:49168 17.248.221.64:443mask-api.icloud.com
-
GET
301
http://mask-api.icloud.com/
REQUEST
RESPONSE
BODY
GET / HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: ko-KR
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: mask-api.icloud.com
Connection: Keep-Alive
HTTP/1.1 301 Moved Permanently
Server: AppleHttpServer/3faf4ee9434b
Date: Fri, 25 Aug 2023 17:25:52 GMT
Content-Type: text/html
Content-Length: 185
Connection: keep-alive
Location: https://mask-api.icloud.com/
GET
200
http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml
REQUEST
RESPONSE
BODY
GET /IE9CompatViewList.xml HTTP/1.1
Accept: */*
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Host: ie9cvlist.ie.microsoft.com
If-Modified-Since: Thu, 21 Nov 2019 19:37:08 GMT
If-None-Match: 0x8D76EBA32AF0BC3
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Encoding: gzip
Age: 1257
Cache-Control: max-age=21600
Content-MD5: p9g4jsuZO6TaLMVAI9ujVg==
Content-Type: text/xml
Date: Fri, 25 Aug 2023 17:26:52 GMT
Etag: 0x8D9521D2D2DF1EC
Last-Modified: Wed, 28 Jul 2021 23:12:31 GMT
Server: ECAcc (tka/897A)
Vary: Accept-Encoding
X-Cache: HIT
x-ms-blob-type: BlockBlob
x-ms-lease-status: unlocked
x-ms-request-id: f22c87a0-d01e-00a0-1576-d72264000000
x-ms-version: 2009-09-19
Content-Length: 13702
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49166 -> 17.248.221.64:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 117.18.232.200:443 -> 192.168.56.101:49176 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 192.168.56.101:49167 -> 17.248.221.64:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 17.248.221.64:443 -> 192.168.56.101:49168 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 192.168.56.101:49174 -> 117.18.232.200:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49175 -> 117.18.232.200:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts