Network Analysis
IP Address | Status | Action |
---|---|---|
193.233.255.73 | Active | Moloch |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
- TCP Requests
POST
200
http://193.233.255.73/loghub/master
REQUEST
RESPONSE
BODY
POST /loghub/master HTTP/1.1
Content-Type: multipart/form-data; boundary=21JhOK23upzCSBLr7L0P
Content-Length: 213
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; InfoPath.1)
Host: 193.233.255.73
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Mon, 23 Oct 2023 07:50:35 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 8
Connection: keep-alive
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
Referrer-Policy: same-origin
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49165 -> 193.233.255.73:80 | 2047625 | ET MALWARE [ANY.RUN] Win32/Stealc Checkin (POST) | A Network Trojan was detected |
TCP 192.168.56.101:49165 -> 193.233.255.73:80 | 2018358 | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts