NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
199.59.243.225 Active Moloch
35.244.161.158 Active Moloch
84.32.84.32 Active Moloch
GET 200 http://www.qysdh1.xyz/o6g2/?w6A=XUg8FO+nVdlH42qXv6cQzVTq2CnZ0d6dCbTCSKxll3i1vjg3d0RwyGaC9/JEVpNUv7bz2nUz&-ZS=W6O83nah-
REQUEST
RESPONSE
GET 200 http://www.educationacielouvert.com/o6g2/?w6A=eeE/5eXEYnavNnNDmshcqn1xSUo8zOrK/Ya4aXTZXUIFTrCuM6Tmu8ev7YaAflYE+piVwyda&-ZS=W6O83nah-
REQUEST
RESPONSE
GET 200 http://www.hydrauliczny.online/o6g2/?w6A=8NW9x49tJV1H9qvd2CBk+oBG7l2hdO9qMKvqNWWs9eYHU8Mmj6uZZUB5FkBqZUv7ofCiF+Pz&-ZS=W6O83nah-
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49166 -> 84.32.84.32:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49167 -> 199.59.243.225:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49165 -> 35.244.161.158:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49165 -> 35.244.161.158:80 2031088 ET HUNTING Request to .XYZ Domain with Minimal Headers Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts