NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.67.163.21 Active Moloch
Name Response Post-Analysis Lookup
bluesaks.fun 104.21.34.166
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 200 http://bluesaks.fun/api
REQUEST
RESPONSE
POST 0 http://bluesaks.fun/api
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49167 -> 172.67.163.21:80 2048093 ET MALWARE [ANY.RUN] Win32/Lumma Stealer Check-In Malware Command and Control Activity Detected
TCP 192.168.56.103:49171 -> 172.67.163.21:80 2048094 ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts