NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.74.182 Active Moloch
164.124.101.2 Active Moloch
Name Response Post-Analysis Lookup
ratefacilityframw.fun 172.67.161.55

POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE
POST 200 http://ratefacilityframw.fun/api
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49166 -> 104.21.74.182:80 2048094 ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration Malware Command and Control Activity Detected
TCP 192.168.56.101:49165 -> 104.21.74.182:80 2048093 ET MALWARE [ANY.RUN] Win32/Lumma Stealer Check-In Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts