Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
ip-api.com | 208.95.112.1 | |
rakishev.net | 172.67.150.79 |
GET
200
http://ip-api.com/json/?fields=11827
REQUEST
RESPONSE
BODY
GET /json/?fields=11827 HTTP/1.1
Host: ip-api.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Wed, 04 Oct 2023 22:47:39 GMT
Content-Type: application/json; charset=utf-8
Content-Length: 166
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
POST
100
http://rakishev.net/wp-load.php
REQUEST
RESPONSE
BODY
POST /wp-load.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----------------------------8dbc5c794af041e
Host: rakishev.net
Content-Length: 1325205
Expect: 100-continue
Connection: Keep-Alive
HTTP/1.1 100 Continue
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49176 -> 208.95.112.1:80 | 2022082 | ET POLICY External IP Lookup ip-api.com | Device Retrieving External IP Address Detected |
TCP 192.168.56.103:49177 -> 104.21.88.34:80 | 2035367 | ET HUNTING Observed Malicious Filename in Outbound POST Request (Information.txt) | A Network Trojan was detected |
TCP 192.168.56.103:49177 -> 104.21.88.34:80 | 2039097 | ET HUNTING PNG in HTTP POST (Outbound) | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts