Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 16, 2023, 10:58 a.m. | Oct. 16, 2023, 11:10 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
itskmc.run.place | 74.207.245.195 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2042829 | ET INFO DYNAMIC_DNS Query to a *.run .place Domain | Potentially Bad Traffic |
TCP 74.207.245.195:8808 -> 192.168.56.103:49164 | 2030673 | ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) | Domain Observed Used for C2 Detected |
TCP 74.207.245.195:8808 -> 192.168.56.103:49164 | 2035595 | ET MALWARE Generic AsyncRAT Style SSL Cert | Domain Observed Used for C2 Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49165 74.207.245.195:8808 |
None | None | None |
TLSv1 192.168.56.103:49164 74.207.245.195:8808 |
CN=AsyncRAT Server | CN=AsyncRAT Server | 91:7f:5f:7a:e0:5b:39:3f:65:05:64:70:91:57:d6:03:63:78:f6:52 |
No signatures