NetWork | ZeroBOX

Network Analysis

IP Address Status Action
158.101.44.242 Active Moloch
164.124.101.2 Active Moloch
172.67.150.79 Active Moloch
GET 200 http://checkip.dyndns.org/
REQUEST
RESPONSE
POST 100 http://rakishev.net/wp-admin/admin-ajax.php
REQUEST
RESPONSE
POST 100 http://rakishev.net/wp-admin/admin-ajax.php
REQUEST
RESPONSE
POST 100 http://rakishev.net/wp-admin/admin-ajax.php
REQUEST
RESPONSE
POST 100 http://rakishev.net/wp-admin/admin-ajax.php
REQUEST
RESPONSE
POST 100 http://rakishev.net/wp-admin/admin-ajax.php
REQUEST
RESPONSE
POST 100 http://rakishev.net/wp-admin/admin-ajax.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.101:53004 -> 164.124.101.2:53 2043238 ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org) Device Retrieving External IP Address Detected
TCP 192.168.56.101:49162 -> 158.101.44.242:80 2021378 ET POLICY External IP Lookup - checkip.dyndns.org Device Retrieving External IP Address Detected
TCP 192.168.56.101:49164 -> 172.67.150.79:80 2034579 ET MALWARE AgentTesla Communicating with CnC Server Malware Command and Control Activity Detected
TCP 192.168.56.101:49164 -> 172.67.150.79:80 2034579 ET MALWARE AgentTesla Communicating with CnC Server Malware Command and Control Activity Detected
TCP 192.168.56.101:49164 -> 172.67.150.79:80 2034579 ET MALWARE AgentTesla Communicating with CnC Server Malware Command and Control Activity Detected
TCP 192.168.56.101:49164 -> 172.67.150.79:80 2034579 ET MALWARE AgentTesla Communicating with CnC Server Malware Command and Control Activity Detected
TCP 192.168.56.101:49164 -> 172.67.150.79:80 2034579 ET MALWARE AgentTesla Communicating with CnC Server Malware Command and Control Activity Detected
TCP 192.168.56.101:49165 -> 172.67.150.79:80 2034579 ET MALWARE AgentTesla Communicating with CnC Server Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts