Network Analysis
IP Address | Status | Action |
---|---|---|
104.17.27.92 | Active | Moloch |
104.17.28.92 | Active | Moloch |
104.17.29.92 | Active | Moloch |
104.17.30.92 | Active | Moloch |
104.17.31.92 | Active | Moloch |
117.18.232.200 | Active | Moloch |
142.250.204.142 | Active | Moloch |
142.251.222.202 | Active | Moloch |
142.251.222.206 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.217.27.42 | Active | Moloch |
185.199.108.133 | Active | Moloch |
Name | Response | Post-Analysis Lookup |
---|---|---|
www.google-analytics.com | 142.250.206.238 | |
fonts.googleapis.com | 142.250.196.106 | |
camo.githubusercontent.com | 185.199.109.133 | |
widget.uservoice.com | 104.17.27.92 |
- TCP Requests
-
-
192.168.56.101:49183 117.18.232.200:80
-
192.168.56.101:49186 117.18.232.200:443
-
192.168.56.101:49187 117.18.232.200:443
-
192.168.56.101:49188 117.18.232.200:443
-
192.168.56.101:49168 185.199.108.133:443camo.githubusercontent.com
-
192.168.56.101:49169 185.199.108.133:443camo.githubusercontent.com
-
192.168.56.101:49170 185.199.108.133:443camo.githubusercontent.com
-
192.168.56.101:49171 185.199.108.133:443camo.githubusercontent.com
-
192.168.56.101:49172 185.199.108.133:443camo.githubusercontent.com
-
- UDP Requests
-
-
192.168.56.101:52797 164.124.101.2:53
-
192.168.56.101:52815 164.124.101.2:53
-
192.168.56.101:53004 164.124.101.2:53
-
192.168.56.101:53850 164.124.101.2:53
-
192.168.56.101:54148 164.124.101.2:53
-
192.168.56.101:54883 164.124.101.2:53
-
192.168.56.101:55146 164.124.101.2:53
-
192.168.56.101:59002 164.124.101.2:53
-
192.168.56.101:61950 164.124.101.2:53
-
192.168.56.101:137 192.168.56.103:137
-
192.168.56.101:137 192.168.56.255:137
-
192.168.56.101:138 192.168.56.255:138
-
192.168.56.101:54886 239.255.255.250:1900
-
GET
200
http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml
REQUEST
RESPONSE
BODY
GET /IE9CompatViewList.xml HTTP/1.1
Accept: */*
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Host: ie9cvlist.ie.microsoft.com
If-Modified-Since: Thu, 21 Nov 2019 19:37:08 GMT
If-None-Match: 0x8D76EBA32AF0BC3
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Encoding: gzip
Age: 3847
Cache-Control: max-age=21600
Content-MD5: p9g4jsuZO6TaLMVAI9ujVg==
Content-Type: text/xml
Date: Tue, 28 May 2024 00:28:21 GMT
Etag: 0x8D9521D2D2DF1EC
Last-Modified: Wed, 28 Jul 2021 23:12:31 GMT
Server: ECAcc (tka/897A)
Vary: Accept-Encoding
X-Cache: HIT
x-ms-blob-type: BlockBlob
x-ms-lease-status: unlocked
x-ms-request-id: 94b2d32d-d01e-0068-778c-b00e90000000
x-ms-version: 2009-09-19
Content-Length: 13702
ICMP traffic
Source | Destination | ICMP Type | Data |
---|---|---|---|
192.168.56.101 | 104.17.29.92 | 8 | ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI |
104.17.29.92 | 192.168.56.101 | 0 | ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI |
192.168.56.101 | 142.250.204.142 | 8 | ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI |
142.250.204.142 | 192.168.56.101 | 0 | ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI |
192.168.56.101 | 142.251.222.202 | 8 | ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI |
142.251.222.202 | 192.168.56.101 | 0 | ABCDEFGHIJKLMNOPQRSTUVWABCDEFGHI |
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49171 -> 185.199.108.133:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49187 -> 117.18.232.200:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49169 -> 185.199.108.133:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 117.18.232.200:443 -> 192.168.56.101:49188 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 192.168.56.101:49186 -> 117.18.232.200:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49168 -> 185.199.108.133:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49170 -> 185.199.108.133:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts