NetWork | ZeroBOX

Network Analysis

IP Address Status Action
132.226.247.73 Active Moloch
158.101.44.242 Active Moloch
164.124.101.2 Active Moloch
172.67.191.205 Active Moloch
193.122.130.0 Active Moloch
193.122.6.168 Active Moloch
GET 200 http://checkip.dyndns.org/
REQUEST
RESPONSE
POST 100 http://rakishev.org/wp-admin/includes/misc.php
REQUEST
RESPONSE
POST 100 http://rakishev.org/wp-admin/includes/misc.php
REQUEST
RESPONSE
POST 100 http://rakishev.org/wp-admin/includes/misc.php
REQUEST
RESPONSE
POST 100 http://rakishev.org/wp-admin/includes/misc.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.103:52760 -> 164.124.101.2:53 2043238 ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49165 -> 158.101.44.242:80 2021378 ET POLICY External IP Lookup - checkip.dyndns.org Device Retrieving External IP Address Detected
TCP 192.168.56.103:49170 -> 172.67.191.205:80 2034579 ET MALWARE AgentTesla Communicating with CnC Server Malware Command and Control Activity Detected
TCP 192.168.56.103:49171 -> 172.67.191.205:80 2034579 ET MALWARE AgentTesla Communicating with CnC Server Malware Command and Control Activity Detected
TCP 192.168.56.103:49169 -> 172.67.191.205:80 2034579 ET MALWARE AgentTesla Communicating with CnC Server Malware Command and Control Activity Detected
TCP 192.168.56.103:49168 -> 172.67.191.205:80 2034579 ET MALWARE AgentTesla Communicating with CnC Server Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts