Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Nov. 10, 2023, 10:02 a.m. | Nov. 10, 2023, 10:05 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
www.ssl.com | 3.213.199.135 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49175 -> 49.13.31.229:80 | 2013028 | ET POLICY curl User-Agent Outbound | Attempted Information Leak |
TCP 192.168.56.102:49175 -> 49.13.31.229:80 | 2034567 | ET HUNTING curl User-Agent to Dotted Quad | Potentially Bad Traffic |
TCP 192.168.56.102:49171 -> 49.13.31.229:80 | 2013028 | ET POLICY curl User-Agent Outbound | Attempted Information Leak |
TCP 192.168.56.102:49171 -> 49.13.31.229:80 | 2034567 | ET HUNTING curl User-Agent to Dotted Quad | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
suspicious_features | Connection to IP address | suspicious_request | GET http://49.13.31.229/tC1n0/insup |
request | GET http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt |
request | GET http://49.13.31.229/tC1n0/insup |
host | 49.13.31.229 |