NetWork | ZeroBOX

Network Analysis

IP Address Status Action
103.47.144.38 Active Moloch
164.124.101.2 Active Moloch
Name Response Post-Analysis Lookup
chongmei33.publicvm.com 103.47.144.38

No traffic

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.101:59002 -> 164.124.101.2:53 2034457 ET POLICY Observed DNS Query to DynDNS Domain (publicvm .com) Potentially Bad Traffic
TCP 192.168.56.101:49169 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49167 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49164 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49166 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49167 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49164 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49167 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49164 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49175 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49166 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49169 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49175 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49166 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49169 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49175 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49174 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49174 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49174 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49168 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49178 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49168 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49178 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49168 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49178 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49172 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49172 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49172 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49173 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49176 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49173 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49176 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49173 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49176 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49170 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49186 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49170 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49186 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49170 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49186 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49184 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49184 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49179 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49184 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49182 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49179 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49182 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49179 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49182 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49188 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49188 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49188 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49181 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49183 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49181 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49183 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49181 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49183 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49185 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49185 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49189 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49185 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49189 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49189 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49187 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49187 -> 103.47.144.38:7045 2017516 ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 Malware Command and Control Activity Detected
TCP 192.168.56.101:49187 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic
TCP 192.168.56.101:49171 -> 103.47.144.38:7045 2027447 ET MALWARE WSHRAT CnC Checkin Malware Command and Control Activity Detected
TCP 192.168.56.101:49171 -> 103.47.144.38:7045 2017968 ET HUNTING Suspicious Possible Process Dump in POST body A Network Trojan was detected
TCP 192.168.56.101:49171 -> 103.47.144.38:7045 2027117 ET HUNTING Suspicious POST with Common Windows Process Names - Possible Process List Exfiltration A Network Trojan was detected
TCP 192.168.56.101:49171 -> 103.47.144.38:7045 2042823 ET INFO DYNAMIC_DNS HTTP Request to a *.publicvm .com Domain Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts