NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.26.9.44 Active Moloch
149.154.167.220 Active Moloch
164.124.101.2 Active Moloch
185.225.75.8 Active Moloch
208.95.112.1 Active Moloch
64.185.227.156 Active Moloch
GET 429 https://ipapi.co/175.208.134.152/json
REQUEST
RESPONSE
GET 200 http://ip-api.com/line/?fields=hosting
REQUEST
RESPONSE
GET 200 http://185.225.75.8/stryzon/fire.php?id=Yjk4MzExNTAwY2U2MTAwZmIwMWNkMWJlN2FkNGI3ZGI=&us=dGVzdDIy&cn=VEVTVDIyLVBDIDogV2luZG93cyA3IFByb2Zlc3Npb25hbCBO
REQUEST
RESPONSE
GET 200 http://185.225.75.8/stryzon/build.exe
REQUEST
RESPONSE
GET 404 http://185.225.75.8/stryzon/fire.php?id=Yjk4MzExNTAwY2U2MTAwZmIwMWNkMWJlN2FkNGI3ZGI=&us=dGVzdDIy&cn=VEVTVDIyLVBDIDogV2luZG93cyA3IFByb2Zlc3Npb25hbCBO&url=aHR0cDovLzE4NS4yMjUuNzUuOC9zdHJ5em9uL2J1aWxkLmV4ZQ==
REQUEST
RESPONSE
GET 200 http://185.225.75.8/stryzon/typhon.exe
REQUEST
RESPONSE
GET 404 http://185.225.75.8/stryzon/fire.php?id=Yjk4MzExNTAwY2U2MTAwZmIwMWNkMWJlN2FkNGI3ZGI=&us=dGVzdDIy&cn=VEVTVDIyLVBDIDogV2luZG93cyA3IFByb2Zlc3Npb25hbCBO&url=aHR0cDovLzE4NS4yMjUuNzUuOC9zdHJ5em9uL3R5cGhvbi5leGU=
REQUEST
RESPONSE
GET 200 http://185.225.75.8/stryzon/cleanse.exe
REQUEST
RESPONSE
GET 404 http://185.225.75.8/stryzon/fire.php?id=Yjk4MzExNTAwY2U2MTAwZmIwMWNkMWJlN2FkNGI3ZGI=&us=dGVzdDIy&cn=VEVTVDIyLVBDIDogV2luZG93cyA3IFByb2Zlc3Npb25hbCBO&url=aHR0cDovLzE4NS4yMjUuNzUuOC9zdHJ5em9uL2NsZWFuc2UuZXhl
REQUEST
RESPONSE
GET 200 http://api.ipify.org/
REQUEST
RESPONSE
GET 200 http://185.225.75.8/stryzon/fire.php?id=Yjk4MzExNTAwY2U2MTAwZmIwMWNkMWJlN2FkNGI3ZGI=&us=dGVzdDIy&cn=VEVTVDIyLVBDIDogV2luZG93cyA3IFByb2Zlc3Npb25hbCBO
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49161 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 185.225.75.8:80 -> 192.168.56.103:49164 2525015 ET 3CORESec Poor Reputation IP group 16 Misc Attack
TCP 192.168.56.103:49164 -> 185.225.75.8:80 2013028 ET POLICY curl User-Agent Outbound Attempted Information Leak
TCP 192.168.56.103:49164 -> 185.225.75.8:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49164 -> 185.225.75.8:80 2034567 ET HUNTING curl User-Agent to Dotted Quad Potentially Bad Traffic
TCP 185.225.75.8:80 -> 192.168.56.103:49164 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.225.75.8:80 -> 192.168.56.103:49164 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
UDP 192.168.56.103:50800 -> 164.124.101.2:53 2047702 ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup Misc activity
UDP 192.168.56.103:53673 -> 8.8.8.8:53 2033966 ET HUNTING Telegram API Domain in DNS Lookup Misc activity
UDP 192.168.56.103:64894 -> 8.8.8.8:53 2024527 ET POLICY External IP Lookup Domain (ipapi .co in DNS lookup) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49169 -> 64.185.227.156:80 2021997 ET POLICY External IP Lookup api.ipify.org Device Retrieving External IP Address Detected
TCP 192.168.56.103:49166 -> 185.225.75.8:3333 2024792 ET POLICY Cryptocurrency Miner Checkin Potential Corporate Privacy Violation
UDP 192.168.56.103:50800 -> 8.8.8.8:53 2047702 ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup Misc activity
TCP 192.168.56.103:49170 -> 104.26.9.44:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49164 -> 185.225.75.8:80 2013028 ET POLICY curl User-Agent Outbound Attempted Information Leak
TCP 192.168.56.103:49164 -> 185.225.75.8:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49164 -> 185.225.75.8:80 2034567 ET HUNTING curl User-Agent to Dotted Quad Potentially Bad Traffic
TCP 192.168.56.103:49164 -> 185.225.75.8:80 2013028 ET POLICY curl User-Agent Outbound Attempted Information Leak
TCP 192.168.56.103:49164 -> 185.225.75.8:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49164 -> 185.225.75.8:80 2034567 ET HUNTING curl User-Agent to Dotted Quad Potentially Bad Traffic
TCP 149.154.167.220:443 -> 192.168.56.103:49171 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49171 -> 149.154.167.220:443 2033967 ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) Misc activity
TCP 192.168.56.103:49171 -> 149.154.167.220:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49171 -> 149.154.167.220:443 2033967 ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) Misc activity
TCP 192.168.56.103:49171 -> 149.154.167.220:443 2033967 ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) Misc activity
TCP 192.168.56.103:49166 -> 185.225.75.8:3333 2024792 ET POLICY Cryptocurrency Miner Checkin Potential Corporate Privacy Violation

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49170
104.26.9.44:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com d9:cd:a6:ef:44:c8:7f:47:5e:47:97:00:58:f2:99:5e:14:e6:1c:cf

Snort Alerts

No Snort Alerts