Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
geoplugin.net | 178.237.33.50 | |
salwanazeeze.duckdns.org | 172.111.167.99 |
- UDP Requests
-
-
192.168.56.102:62846 164.124.101.2:53
-
192.168.56.102:63709 164.124.101.2:53
-
192.168.56.102:64513 164.124.101.2:53
-
192.168.56.102:137 192.168.56.255:137
-
192.168.56.102:138 192.168.56.255:138
-
192.168.56.102:49152 239.255.255.250:3702
-
192.168.56.102:62849 239.255.255.250:1900
-
52.231.114.183:123 192.168.56.102:123
-
GET
200
http://geoplugin.net/json.gp
REQUEST
RESPONSE
BODY
GET /json.gp HTTP/1.1
Host: geoplugin.net
Cache-Control: no-cache
HTTP/1.1 200 OK
date: Tue, 10 Oct 2023 01:16:35 GMT
server: Apache
expires: Tue, 10 Oct 2023 01:16:35 GMT
content-length: 949
content-type: application/json; charset=utf-8
cache-control: public, max-age=300
access-control-allow-origin: *
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.102:63709 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.102:63709 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
TCP 192.168.56.102:49161 -> 172.111.167.99:9595 | 2036594 | ET JA3 Hash - Remcos 3.x TLS Connection | Malware Command and Control Activity Detected |
TCP 192.168.56.102:49163 -> 172.111.167.99:9595 | 2036594 | ET JA3 Hash - Remcos 3.x TLS Connection | Malware Command and Control Activity Detected |
TCP 192.168.56.102:49164 -> 172.111.167.99:9595 | 2036594 | ET JA3 Hash - Remcos 3.x TLS Connection | Malware Command and Control Activity Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.102:49161 172.111.167.99:9595 |
None | None | None |
TLS 1.3 192.168.56.102:49163 172.111.167.99:9595 |
None | None | None |
TLS 1.3 192.168.56.102:49164 172.111.167.99:9595 |
None | None | None |
Snort Alerts
No Snort Alerts