NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.11.117 Active Moloch
104.21.43.83 Active Moloch
121.254.136.9 Active Moloch
13.225.110.102 Active Moloch
164.124.101.2 Active Moloch
18.64.13.155 Active Moloch
94.156.35.76 Active Moloch
GET 200 https://d2csnxzxwctx26.cloudfront.net/load/load.php?c=1002
REQUEST
RESPONSE
GET 200 https://d22hce23hy1ej9.cloudfront.net/load/th.php?a=2836&c=1002
REQUEST
RESPONSE
GET 302 https://d22hce23hy1ej9.cloudfront.net/load/dl.php?id=458&c=1002
REQUEST
RESPONSE
GET 200 https://cdn-edge-node.com/online_security_mkl.exe
REQUEST
RESPONSE
GET 302 https://d22hce23hy1ej9.cloudfront.net/load/dl.php?id=444&c=1002
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 404 http://240429000936002.mjt.kqri92.top/f/fvgbm0428902.txt
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49163 -> 18.64.13.155:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49172 -> 104.21.11.117:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49167 -> 13.225.110.102:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49171 -> 13.225.110.102:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49181 -> 13.225.110.102:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49183 -> 94.156.35.76:80 2023882 ET INFO HTTP Request to a *.top domain Potentially Bad Traffic
TCP 192.168.56.101:49180 -> 104.21.43.83:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.101:61950 -> 164.124.101.2:53 2023883 ET DNS Query to a *.top domain - Likely Hostile Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49172
104.21.11.117:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=cdn-edge-node.com 91:0f:27:57:ee:98:f8:5f:d5:7c:7c:6c:88:dd:0b:40:d7:4a:45:06
TLSv1
192.168.56.101:49163
18.64.13.155:443
C=US, O=Amazon, CN=Amazon RSA 2048 M01 CN=*.cloudfront.net fa:21:45:dc:4d:94:03:a3:09:77:51:78:4a:21:f2:c5:6d:94:be:52
TLSv1
192.168.56.101:49167
13.225.110.102:443
C=US, O=Amazon, CN=Amazon RSA 2048 M01 CN=*.cloudfront.net fa:21:45:dc:4d:94:03:a3:09:77:51:78:4a:21:f2:c5:6d:94:be:52
TLSv1
192.168.56.101:49171
13.225.110.102:443
C=US, O=Amazon, CN=Amazon RSA 2048 M01 CN=*.cloudfront.net fa:21:45:dc:4d:94:03:a3:09:77:51:78:4a:21:f2:c5:6d:94:be:52
TLSv1
192.168.56.101:49181
13.225.110.102:443
C=US, O=Amazon, CN=Amazon RSA 2048 M01 CN=*.cloudfront.net fa:21:45:dc:4d:94:03:a3:09:77:51:78:4a:21:f2:c5:6d:94:be:52
TLSv1
192.168.56.101:49180
104.21.43.83:443
C=US, O=Let's Encrypt, CN=E1 CN=adblock2024.shop f6:53:16:b6:98:89:7a:ae:57:00:89:be:e1:b6:81:59:8e:db:ed:ab

Snort Alerts

No Snort Alerts