Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
apps.identrust.com |
CNAME
a1952.dscq.akamai.net
CNAME
identrust.edgesuite.net
|
23.67.53.27 |
paste.ee | 104.21.84.67 | |
uploaddeimagens.com.br | 104.21.45.138 |
- UDP Requests
-
-
192.168.56.102:56630 164.124.101.2:53
-
192.168.56.102:62846 164.124.101.2:53
-
192.168.56.102:63709 164.124.101.2:53
-
192.168.56.102:64513 164.124.101.2:53
-
192.168.56.102:137 192.168.56.255:137
-
192.168.56.102:138 192.168.56.255:138
-
192.168.56.102:49152 239.255.255.250:3702
-
192.168.56.102:56633 239.255.255.250:1900
-
52.231.114.183:123 192.168.56.102:123
-
GET
200
https://paste.ee/d/qm3k3
REQUEST
RESPONSE
BODY
GET /d/qm3k3 HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Language: ko
User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Host: paste.ee
HTTP/1.1 200 OK
Date: Sat, 28 Oct 2023 09:55:04 GMT
Content-Type: text/plain; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
Cache-Control: max-age=2592000
strict-transport-security: max-age=63072000
x-frame-options: DENY
x-content-type-options: nosniff
x-xss-protection: 1; mode=block
content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=d4JpVl8AnnQ5oVYjTuYMKfQ3TlPlygbSfwP4kozhwC7zAts%2B1eJBppwBgiuwhaVj%2FrU0DwvIDeQwFRs34VP%2BxpyBW4wMCqBut%2BXLphuiTEQh9HnB4e%2FOGOm4Cg%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 81d24d0ef8342f7d-LAX
alt-svc: h3=":443"; ma=86400
GET
200
http://192.3.64.154/9080/HTMLIEbrowserhistory.vbs
REQUEST
RESPONSE
BODY
GET /9080/HTMLIEbrowserhistory.vbs HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; MARKANYEPS#25118)
Host: 192.3.64.154
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Sat, 28 Oct 2023 09:55:02 GMT
Server: Apache/2.4.56 (Win64) OpenSSL/1.1.1t PHP/8.1.17
Last-Modified: Thu, 26 Oct 2023 09:21:03 GMT
ETag: "1ba08-6089b173fb64b"
Accept-Ranges: bytes
Content-Length: 113160
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
GET
200
http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
BODY
GET /roots/dstrootcax3.p7c HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: apps.identrust.com
HTTP/1.1 200 OK
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-Robots-Tag: noindex
Referrer-Policy: same-origin
Last-Modified: Fri, 13 Oct 2023 16:28:31 GMT
ETag: "37d-6079b8c0929c0"
Accept-Ranges: bytes
Content-Length: 893
X-Content-Type-Options: nosniff
X-Frame-Options: sameorigin
Content-Type: application/pkcs7-mime
Cache-Control: max-age=3600
Expires: Sat, 28 Oct 2023 10:55:07 GMT
Date: Sat, 28 Oct 2023 09:55:07 GMT
Connection: keep-alive
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49167 -> 172.67.215.45:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49162 -> 192.3.64.154:80 | 2027260 | ET INFO Dotted Quad Host VBS Request | Potentially Bad Traffic |
TCP 192.168.56.102:49164 -> 172.67.187.200:443 | 2034978 | ET POLICY Pastebin-style Service (paste .ee) in TLS SNI | Potential Corporate Privacy Violation |
TCP 192.168.56.102:49164 -> 172.67.187.200:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49167 172.67.215.45:443 |
C=US, O=Let's Encrypt, CN=E1 | CN=uploaddeimagens.com.br | d4:47:9f:16:cd:db:0a:99:1e:d8:a8:20:24:9b:c9:bb:4c:62:39:71 |
TLSv1 192.168.56.102:49164 172.67.187.200:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=paste.ee | cd:77:4c:26:1f:f8:63:15:43:5a:ba:aa:11:f1:e7:1a:23:3e:4b:15 |
Snort Alerts
No Snort Alerts