NetWork | ZeroBOX

Network Analysis

IP Address Status Action
18.244.61.37 Active Moloch
104.153.233.177 Active Moloch
104.192.141.1 Active Moloch
104.20.3.235 Active Moloch
104.21.66.124 Active Moloch
104.26.5.15 Active Moloch
104.26.9.59 Active Moloch
121.254.136.9 Active Moloch
147.45.47.149 Active Moloch
13.225.129.190 Active Moloch
147.45.47.70 Active Moloch
164.124.101.2 Active Moloch
172.67.169.89 Active Moloch
172.67.19.24 Active Moloch
172.67.213.39 Active Moloch
185.172.128.159 Active Moloch
185.172.128.19 Active Moloch
185.172.128.69 Active Moloch
185.172.128.82 Active Moloch
185.215.113.67 Active Moloch
18.244.61.49 Active Moloch
18.244.61.7 Active Moloch
18.244.61.79 Active Moloch
18.64.13.203 Active Moloch
194.54.164.123 Active Moloch
23.43.165.153 Active Moloch
23.52.33.11 Active Moloch
34.117.186.192 Active Moloch
45.130.41.108 Active Moloch
5.42.66.10 Active Moloch
5.42.66.47 Active Moloch
51.75.247.100 Active Moloch
54.192.175.109 Active Moloch
54.230.61.34 Active Moloch
54.230.61.39 Active Moloch
54.230.61.65 Active Moloch
54.230.61.95 Active Moloch
54.255.136.181 Active Moloch
54.76.174.118 Active Moloch
54.77.42.29 Active Moloch
37.221.125.202 Active Moloch
51.15.65.182 Active Moloch
51.195.138.197 Active Moloch
64.185.227.155 Active Moloch
77.91.77.33 Active Moloch
82.145.215.156 Active Moloch
85.192.56.26 Active Moloch
87.240.132.78 Active Moloch
91.202.233.232 Active Moloch
94.232.45.38 Active Moloch
Name Response Post-Analysis Lookup
zeph-eu2.nanopool.org 51.68.137.186
pastebin.com 104.20.3.235
st.p.360safe.com 54.77.42.29
x1.i.lencr.org 23.35.220.247
apps.identrust.com 23.210.247.57
dj1a9dwix5pje.cloudfront.net 18.64.13.95
ipinfo.io 34.117.186.192
download.winzip.com 23.43.165.155
orion.ts.360.com 82.145.215.152
s.360safe.com 54.255.136.181
f000.backblazeb2.com 104.153.233.177
api64.ipify.org 104.237.62.213
iup.360safe.com 54.230.61.95
f.123654987.xyz 37.221.125.202
bitbucket.org 104.192.141.1
vk.com 87.240.132.67
tr.p.360safe.com 54.76.174.118
int.down.360safe.com 18.244.61.79
gigapub.ma 51.75.247.100
monoblocked.com 45.130.41.108
sd.p.360safe.com 13.225.129.154
free.360totalsecurity.com 54.192.175.109
xmr-eu1.nanopool.org 54.37.137.114
yip.su 172.67.169.89
lop.foxesjoy.com 104.21.66.124
fleur-de-lis.sbs 172.67.213.39
judgecaption.hair 194.54.164.123
api.myip.com 172.67.75.163
db-ip.com 104.26.4.15

GET 200 https://pastebin.com/raw/E0rY26ni
REQUEST
RESPONSE
GET 200 https://yip.su/RNWPd.exe
REQUEST
RESPONSE
GET 200 https://free.360totalsecurity.com/totalsecurity/360TS_Setup_Mini_WW.Marketator.CPI20230405_6.6.0.1054.exe
REQUEST
RESPONSE
GET 200 https://db-ip.com/demo/home.php?s=
REQUEST
RESPONSE
GET 200 https://orion.ts.360.com/installapp?c=&ch=WW.Marketator.CPI20230405&sch=0&ver=11.0.0.1103&lan=en&os=6.1-x64&mid=3b96717f137ac716bab250f817240788&time=1717128845&checksum=7B01354214C41247269FE750
REQUEST
RESPONSE
HEAD 302 https://dj1a9dwix5pje.cloudfront.net/load/ddl.php?c=1001
REQUEST
RESPONSE
HEAD 302 https://fleur-de-lis.sbs/jhgfd
REQUEST
RESPONSE
GET 200 https://lop.foxesjoy.com/ssl/crt.exe
REQUEST
RESPONSE
HEAD 200 https://dj1a9dwix5pje.cloudfront.net/load/loader-1001.exe
REQUEST
RESPONSE
HEAD 200 https://fleur-de-lis.sbs/post/File_294/setup294.exe
REQUEST
RESPONSE
GET 302 https://fleur-de-lis.sbs/jhgfd
REQUEST
RESPONSE
GET 302 https://dj1a9dwix5pje.cloudfront.net/load/ddl.php?c=1001
REQUEST
RESPONSE
GET 200 https://fleur-de-lis.sbs/post/File_294/setup294.exe
REQUEST
RESPONSE
GET 200 https://dj1a9dwix5pje.cloudfront.net/load/loader-1001.exe
REQUEST
RESPONSE
GET 301 https://monoblocked.com/525403/setup.exe
REQUEST
RESPONSE
GET 404 https://bitbucket.org/qwizzi/tt522222/downloads/GroceryExtensive.exe
REQUEST
RESPONSE
POST 200 http://147.45.47.70/tr8nomy/index.php
REQUEST
RESPONSE
POST 200 http://147.45.47.70/tr8nomy/index.php
REQUEST
RESPONSE
GET 200 http://147.45.47.70/lend/33333.exe
REQUEST
RESPONSE
POST 200 http://147.45.47.70/tr8nomy/index.php
REQUEST
RESPONSE
GET 200 http://147.45.47.70/lend/fileosn.exe
REQUEST
RESPONSE
POST 200 http://147.45.47.70/tr8nomy/index.php
REQUEST
RESPONSE
GET 200 http://147.45.47.70/lend/lumma1234.exe
REQUEST
RESPONSE
POST 200 http://147.45.47.70/tr8nomy/index.php
REQUEST
RESPONSE
GET 200 http://147.45.47.70/lend/gold.exe
REQUEST
RESPONSE
POST 200 http://147.45.47.70/tr8nomy/index.php
REQUEST
RESPONSE
GET 200 http://147.45.47.70/lend/swizzzz.exe
REQUEST
RESPONSE
POST 200 http://147.45.47.70/tr8nomy/index.php
REQUEST
RESPONSE
GET 200 http://147.45.47.70/lend/file300un.exe
REQUEST
RESPONSE
POST 200 http://147.45.47.70/tr8nomy/index.php
REQUEST
RESPONSE
GET 404 http://147.45.47.70/lend/CoMachina.exe
REQUEST
RESPONSE
POST 200 http://147.45.47.70/tr8nomy/index.php
REQUEST
RESPONSE
GET 200 http://185.172.128.19/Newoff.exe
REQUEST
RESPONSE
POST 200 http://185.172.128.19/ghsdh39s/index.php
REQUEST
RESPONSE
POST 200 http://147.45.47.70/tr8nomy/index.php
REQUEST
RESPONSE
POST 200 http://185.172.128.19/ghsdh39s/index.php
REQUEST
RESPONSE
GET 200 http://185.172.128.19/FirstZ.exe
REQUEST
RESPONSE
POST 200 http://185.172.128.19/ghsdh39s/index.php
REQUEST
RESPONSE
GET 302 http://judgecaption.hair/load/download.php?c=1002
REQUEST
RESPONSE
GET 200 http://x1.i.lencr.org/
REQUEST
RESPONSE
GET 302 http://judgecaption.hair/load/download.php?c=1002
REQUEST
RESPONSE
GET 302 http://judgecaption.hair/load/download.php?c=1002
REQUEST
RESPONSE
GET 200 http://185.172.128.82/server/12/AppGate2103v01.exe
REQUEST
RESPONSE
GET 200 http://5.42.66.47/files/setup.exe
REQUEST
RESPONSE
GET 404 http://5.42.66.47/files/kpow.exe
REQUEST
RESPONSE
GET 200 http://s.360safe.com/360ts/mini_inst.htm?ver=6.6.0.1054&pid=WW.Marketator.CPI20230405&os=6.1&mid=3b96717f137ac716bab250f817240788&state=153
REQUEST
RESPONSE
GET 200 http://s.360safe.com/safei18n/query_env.htm?v611=DgY0MAEIaE8ANQABAACIxljg%2Bs3AO%2B0eWhzT0CCPWqvYqoW%2FAXsYCkM61lI%2BjOdsVPZofosJfkCESIQRWuogw%2Bxnis1yNTX%2BrFjUu6Agqzr7kjY%2FLdgky7wDkGwc1XBOmQC4lKBxt2mIp6Ntq%2FaVMIjGmvkz3VZAnrlTdRwC6RQbG5%2BLDjWJ1p%2FmKxXWoNNk700GNXR5xGTIwsxCwki4zsrmGoivJ0Qf9A45nkrMHdSG6RZfjTMCiFDkqsBk4iHajyAb4j%2F2JtKI4HfOJwBZ%2FBSRCThuwwfgVUkxwGsXYg37lTWkQgNdiCixMwoCkb770r4G4gQUR0%2FBAdU%2BEJinoJ3yydoquYw3e5hR%2BBmWS4tWrUz0bl9LrJXnrP5CcdiAJ3ITPstRbLsmxqf4VDOts1Z75JuBm6GmmA0kf4X7RZvIf2F8Ir5P0kmgaCKCvEm9ndsRxV5dZ%2F72AxQrWWc%3D
REQUEST
RESPONSE
GET 200 http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Rel.cab
REQUEST
RESPONSE
GET 200 http://s.360safe.com/safei18n/dimana.htm?lr=1&mid=3b96717f137ac716bab250f817240788&mod=360Installer.exe&ph=02a8342074eb25c8adb2d135e2bab7e5&p2p=1&t_id=360TS_Setup_For_Mini.cab&tads=656&tdl=656&tds=656&terr=0&tes=Status|1,ErrorCode|0,DnCount|6,HttpNum|1,DnFailCount|6,FStatus|1,P2SS|656,P2PS|0,PDMode|2&tfl=656&tp=t&tst=1&ttdl=656&ttm=1000&ttup=120&vh=1.3.0.1361&vp=1.3.0.1320&softname=360TS
REQUEST
RESPONSE
GET 200 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 200 http://sd.p.360safe.com/AC05282966EF28F0BC58DFBBE2E9591EF2A43BD6.trt
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 206 http://int.down.360safe.com/totalsecurity/360TS_Setup_11.0.0.1103.exe
REQUEST
RESPONSE
GET 200 http://s.360safe.com/safei18n/dimana.htm?lr=1&mid=3b96717f137ac716bab250f817240788&mod=360Installer.exe&ph=BA320C501D0312BEC018E22653081CCD&p2p=1&t_id=360TS_Setup.exe&tads=14824882&tdl=103774176&tds=14571280&terr=0&tes=Status|1,ErrorCode|0,DnCount|23,HttpNum|18,DnFailCount|22,FStatus|1,P2SS|103774176,P2PS|0,PDMode|3&tfl=103774176&tp=t&tst=1&ttdl=103774176&ttm=7219&ttup=120&vh=1.3.0.1361&vp=1.3.0.1320&softname=360TS
REQUEST
RESPONSE
GET 200 http://85.192.56.26/api/bing_release.php
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://s.360safe.com/360ts/mini_inst.htm?ver=6.6.0.1054&pid=WW.Marketator.CPI20230405&os=6.1&mid=3b96717f137ac716bab250f817240788&state=9&dt=7&size=103774176&ds=14824882.29
REQUEST
RESPONSE
POST 200 http://85.192.56.26/api/flash.php
REQUEST
RESPONSE
POST 200 http://85.192.56.26/api/flash.php
REQUEST
RESPONSE
HEAD 200 http://5.42.66.10/download/th/getimage12.php
REQUEST
RESPONSE
HEAD 200 http://5.42.66.10/download/123p.exe
REQUEST
RESPONSE
HEAD 200 http://77.91.77.33/current.exe
REQUEST
RESPONSE
HEAD 200 http://185.172.128.159/dl.php
REQUEST
RESPONSE
HEAD 200 http://185.172.128.69/download.php?pub=inte
REQUEST
RESPONSE
HEAD 200 http://94.232.45.38/eee01/eee01.exe
REQUEST
RESPONSE
HEAD 200 http://91.202.233.232/o2i3jroi23joj23ikrjokij3oroi.exe
REQUEST
RESPONSE
GET 200 http://77.91.77.33/current.exe
REQUEST
RESPONSE
HEAD 302 http://judgecaption.hair/load/download.php?c=1001
REQUEST
RESPONSE
HEAD 301 http://fleur-de-lis.sbs/jhgfd
REQUEST
RESPONSE
GET 200 http://91.202.233.232/o2i3jroi23joj23ikrjokij3oroi.exe
REQUEST
RESPONSE
GET 200 http://185.172.128.159/dl.php
REQUEST
RESPONSE
GET 200 http://185.172.128.69/download.php?pub=inte
REQUEST
RESPONSE
GET 200 http://5.42.66.10/download/th/getimage12.php
REQUEST
RESPONSE
HEAD 200 http://5.42.66.10/download/th/retail.php
REQUEST
RESPONSE
GET 200 http://94.232.45.38/eee01/eee01.exe
REQUEST
RESPONSE
GET 200 http://5.42.66.10/download/123p.exe
REQUEST
RESPONSE
GET 302 http://judgecaption.hair/load/download.php?c=1001
REQUEST
RESPONSE
GET 301 http://fleur-de-lis.sbs/jhgfd
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
HEAD 200 http://5.42.66.10/download/th/space.php
REQUEST
RESPONSE
GET 200 http://5.42.66.10/download/th/space.php
REQUEST
RESPONSE
GET 200 http://5.42.66.10/download/th/retail.php
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
54.76.174.118 192.168.56.103 3
54.76.174.118 192.168.56.103 3
54.76.174.118 192.168.56.103 3
54.76.174.118 192.168.56.103 3
54.76.174.118 192.168.56.103 3
54.77.42.29 192.168.56.103 3
54.77.42.29 192.168.56.103 3
54.77.42.29 192.168.56.103 3
54.77.42.29 192.168.56.103 3
54.77.42.29 192.168.56.103 3
54.77.42.29 192.168.56.103 3
54.77.42.29 192.168.56.103 3

IRC traffic

Command Params Type
USER NAME\x00\x00\x00Sf\x83\xb8\xd2\x00\x00\x00\x00t\x0e\x8b\xd8\x8b\x83\xd4\x00\x00\x00\xff\x93\xd0\x00\x00\x00[\xc3\x90U\x8b\xec\x83\xc4\xf4SV3\xdb\x89]\xfc\x8b\xf1\x8b\xda3\xc0Uh\xac7H\x00d\xff0d\x89 \x8dE\xfcP\x89u\xf4\xc6E\xf8\x0b\x8dU\xf43\xc9\x8b\xc3\xe8z]\xf8\xff\x8bE\xfc\xe8V \xf8\xff\x8b\xd8Sj\x00\xe8\xca\xac\xff\xfff\x85\xc0u Sj\x00\xe8\x9f\xac\xff\xff\xe8\xb2\xf3\xff\xff3\xc0ZYYd\x89\x10h\xb37H\x00\x8dE\xfc\xe8e\x08\xf8\xff\xc3\xe9c\x02\xf8\xff\xeb\xf0^[\x8b\xe5]\xc3\x8d@\x00SVWUQ\x89\x14$\x8b\xe8\x8bE4\x8bp\x08N\x85\xf6|4F3\xff\x8bE4\x8b\xd7\xe8\xe6\x85\xf9\xff\x8b\xd8\x83\xbb\x90\x00\x00\x00\x00u\x06\x80{j\x00t\x12\x8b\x83\x90\x00\x00\x00 client
USER NAME\x00\x00\x00\xff\xff\xff\xff\x08\x00\x00\x00PASSWORD\x00\x00\x00\x00U\x8b\xec3\xc9QQQQSVW3\xc0Uh\xbf`H\x00d\xff0d\x89 \x8bE\x08\x80x\xff\x00t2\x8bE\x08\x8b@\xf8\x83\xb8\x94\x00\x00\x00\x00t\x1f\x8bE\x08\x8b@\xf8\x8b\x80\x90\x00\x00\x00\x8bU\x08\x8bR\xf8\x8b\x92\x94\x00\x00\x00 client
USER NAME\x00\x00\x00\xff\xff\xff\xff\x08\x00\x00\x00PASSWORD\x00\x00\x00\x00\x04\x00\x00\x00S\x8b\xd8\x8b\x93\x90\x00\x00\x00\x8b\x83\x80\x00\x00\x00\xe8 \xd4\xff\xff\x8b\xd0\x8b\xc3\xe8\x1b\x04\x00\x00\xc6Co\x00\x83{x\x00\x0f\x95\xc0[\xc3\x8b\xc0U\x8b\xec\x83\xc4\xa4SVW3\xd2\x89U\xa4\x89U\xa8\x89U\xf8\x89U\xf4\x89E\xfc3\xc0UhogH\x00d\xff0d\x89 \x8bE\xfc\x83xx\x00\x0f\x85\x9b\x02\x00\x00\x8bE\xfc\xe8\x9f\xf5\xff\xff\xb2\x01\x8bE\xfc\xe8\xf5\xf5\xff\xff\x8bE\xfc\x80xq\x00t\x10\x8bE\xfc\xe8|\xff\xff\xff\x84\xc0\x0f\x85p\x02\x00\x00\x8bE\xfc\x8b\x80\x80\x00\x00\x00\xe8\xba\xe0\xff\xff3\xc0Uh=gH\x00d\xff0d\x89 \x8bE\xfc\x8b\x80\x80\x00\x00\x00\xe8 client

Suricata Alerts

Flow SID Signature Category
TCP 147.45.47.70:80 -> 192.168.56.103:49167 2400022 ET DROP Spamhaus DROP Listed Traffic Inbound group 23 Misc Attack
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 147.45.47.70:80 -> 192.168.56.103:49167 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 147.45.47.70:80 -> 192.168.56.103:49167 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 147.45.47.70:80 -> 192.168.56.103:49167 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.215.113.67:40960 -> 192.168.56.103:49172 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043233 ET INFO Microsoft net.tcp Connection Initialization Activity Potentially Bad Traffic
TCP 192.168.56.103:49177 -> 185.172.128.19:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49179 -> 185.172.128.19:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.172.128.19:80 -> 192.168.56.103:49177 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.172.128.19:80 -> 192.168.56.103:49177 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.172.128.19:80 -> 192.168.56.103:49177 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.172.128.19:80 -> 192.168.56.103:49179 2014819 ET INFO Packed Executable Download Misc activity
TCP 185.172.128.19:80 -> 192.168.56.103:49179 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.172.128.19:80 -> 192.168.56.103:49179 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.172.128.19:80 -> 192.168.56.103:49179 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2046045 ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) A Network Trojan was detected
TCP 185.215.113.67:40960 -> 192.168.56.103:49172 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 185.215.113.67:40960 -> 192.168.56.103:49172 2046056 ET MALWARE Redline Stealer/MetaStealer Family Activity (Response) A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49192 -> 172.67.169.89:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49187 -> 23.43.165.153:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 5.42.66.47:80 -> 192.168.56.103:49194 2400000 ET DROP Spamhaus DROP Listed Traffic Inbound group 1 Misc Attack
TCP 51.75.247.100:443 -> 192.168.56.103:49197 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49197 -> 51.75.247.100:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49194 -> 5.42.66.47:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 5.42.66.47:80 -> 192.168.56.103:49194 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 5.42.66.47:80 -> 192.168.56.103:49194 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 5.42.66.47:80 -> 192.168.56.103:49194 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49191 -> 172.67.19.24:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49196 -> 54.192.175.109:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49179 -> 185.172.128.19:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49199 -> 104.153.233.177:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.103:28333 -> 54.77.42.29:3478 2018906 ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag false) Generic Protocol Command Decode
UDP 192.168.56.103:28333 -> 54.77.42.29:3478 2018905 ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true) Generic Protocol Command Decode
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.103:49167 -> 147.45.47.70:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49183 -> 23.43.165.153:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49188 -> 23.43.165.153:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49195 -> 5.42.66.47:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 18.244.61.7:80 -> 192.168.56.103:49213 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
UDP 192.168.56.103:56613 -> 164.124.101.2:53 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related Potentially Bad Traffic
TCP 192.168.56.103:49193 -> 185.172.128.82:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.172.128.82:80 -> 192.168.56.103:49193 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.172.128.82:80 -> 192.168.56.103:49193 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.172.128.82:80 -> 192.168.56.103:49193 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
UDP 192.168.56.103:28332 -> 54.77.42.29:3478 2018904 ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false) Generic Protocol Command Decode
TCP 192.168.56.103:49179 -> 185.172.128.19:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.103:49241 -> 104.26.9.59:443 2042969 ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49241 -> 104.26.9.59:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49241 -> 104.26.9.59:443 2042969 ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49243 -> 64.185.227.155:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.103:49243 -> 64.185.227.155:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49243 -> 64.185.227.155:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
UDP 192.168.56.103:64354 -> 164.124.101.2:53 2033268 ET POLICY Observed DNS Query to Coin Mining Domain (nanopool .org) Potential Corporate Privacy Violation
TCP 5.42.66.10:80 -> 192.168.56.103:49269 2400000 ET DROP Spamhaus DROP Listed Traffic Inbound group 1 Misc Attack
TCP 192.168.56.103:49278 -> 104.21.66.124:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49278 -> 104.21.66.124:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49254 -> 82.145.215.156:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 147.45.47.149:80 -> 192.168.56.103:49273 2400022 ET DROP Spamhaus DROP Listed Traffic Inbound group 23 Misc Attack
TCP 192.168.56.103:49285 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49285 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49240 -> 85.192.56.26:80 2052789 ET MALWARE Private Loader Related Activity (GET) A Network Trojan was detected
TCP 192.168.56.103:49270 -> 77.91.77.33:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
UDP 192.168.56.103:52004 -> 164.124.101.2:53 2047702 ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup Misc activity
TCP 192.168.56.103:49270 -> 77.91.77.33:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49282 -> 45.130.41.108:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49282 -> 45.130.41.108:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49286 -> 104.21.66.124:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49274 -> 94.232.45.38:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 77.91.77.33:80 -> 192.168.56.103:49270 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 77.91.77.33:80 -> 192.168.56.103:49270 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 5.42.66.10:80 -> 192.168.56.103:49269 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 5.42.66.10:80 -> 192.168.56.103:49269 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 5.42.66.10:80 -> 192.168.56.103:49269 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49283 -> 104.21.66.124:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49283 -> 104.21.66.124:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49274 -> 94.232.45.38:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49245 -> 34.117.186.192:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49245 -> 34.117.186.192:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49245 -> 34.117.186.192:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 185.172.128.69:80 -> 192.168.56.103:49272 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.172.128.69:80 -> 192.168.56.103:49272 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.172.128.69:80 -> 192.168.56.103:49272 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49284 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49284 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49247 -> 104.26.5.15:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49287 -> 172.67.213.39:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 94.232.45.38:80 -> 192.168.56.103:49274 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 94.232.45.38:80 -> 192.168.56.103:49274 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49245 -> 34.117.186.192:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49297 -> 147.45.47.149:54674 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 147.45.47.149:54674 -> 192.168.56.103:49297 2014819 ET INFO Packed Executable Download Misc activity
TCP 192.168.56.103:49291 -> 18.64.13.203:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 185.172.128.159:80 -> 192.168.56.103:49271 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.172.128.159:80 -> 192.168.56.103:49271 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.172.128.159:80 -> 192.168.56.103:49271 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49288 -> 45.130.41.108:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49288 -> 45.130.41.108:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 94.232.45.38:80 -> 192.168.56.103:49274 2015744 ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) Misc activity
TCP 192.168.56.103:49292 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 87.240.132.78:80 -> 192.168.56.103:49292 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49295 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 147.45.47.149:54674 -> 192.168.56.103:49297 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 147.45.47.149:54674 -> 192.168.56.103:49297 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49303 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49301 -> 45.130.41.108:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49302 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49306 -> 87.240.132.78:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49277 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49277 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49308 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49312 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49310 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49310 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 64.185.227.155:443 -> 192.168.56.103:49244 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49315 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49315 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49316 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49316 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49257 -> 104.20.3.235:443 906200068 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (CoinMiner) undefined
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
UDP 192.168.56.103:50816 -> 164.124.101.2:53 2033268 ET POLICY Observed DNS Query to Coin Mining Domain (nanopool .org) Potential Corporate Privacy Violation
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49319 -> 37.221.125.202:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49317 -> 87.240.132.78:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49322 -> 37.221.125.202:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 87.240.132.78:80 -> 192.168.56.103:49320 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49323 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 87.240.132.78:80 -> 192.168.56.103:49323 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 37.221.125.202:443 -> 192.168.56.103:49324 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49326 -> 87.240.132.78:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49325 -> 87.240.132.78:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49330 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49331 -> 87.240.132.78:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49335 -> 87.240.132.78:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49265 -> 85.192.56.26:80 2049837 ET MALWARE Suspected PrivateLoader Activity (POST) A Network Trojan was detected
TCP 192.168.56.103:49265 -> 85.192.56.26:80 2049837 ET MALWARE Suspected PrivateLoader Activity (POST) A Network Trojan was detected
TCP 91.202.233.232:80 -> 192.168.56.103:49275 2400013 ET DROP Spamhaus DROP Listed Traffic Inbound group 14 Misc Attack
TCP 192.168.56.103:49275 -> 91.202.233.232:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49268 -> 5.42.66.10:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49276 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49276 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49275 -> 91.202.233.232:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49268 -> 5.42.66.10:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 91.202.233.232:80 -> 192.168.56.103:49275 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 91.202.233.232:80 -> 192.168.56.103:49275 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49293 -> 104.21.66.124:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49290 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 87.240.132.78:80 -> 192.168.56.103:49290 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 5.42.66.10:80 -> 192.168.56.103:49268 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 5.42.66.10:80 -> 192.168.56.103:49268 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49294 -> 45.130.41.108:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49296 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49296 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 5.42.66.10:80 -> 192.168.56.103:49342 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 5.42.66.10:80 -> 192.168.56.103:49342 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 5.42.66.10:80 -> 192.168.56.103:49342 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49304 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49304 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49307 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49307 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49311 -> 87.240.132.78:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49363 -> 104.192.141.1:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49318 -> 87.240.132.78:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49318 -> 87.240.132.78:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 5.42.66.10:80 -> 192.168.56.103:49332 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 5.42.66.10:80 -> 192.168.56.103:49332 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 5.42.66.10:80 -> 192.168.56.103:49332 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49172 -> 185.215.113.67:40960 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49245 -> 34.117.186.192:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49192
172.67.169.89:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=yip.su d6:8b:e9:f2:36:d3:41:9a:cd:54:05:25:68:49:59:5d:36:4b:1a:38
TLSv1
192.168.56.103:49187
23.43.165.153:443
C=US, O=Let's Encrypt, CN=R3 CN=download.winzip.com 30:9b:82:ca:d6:ce:c6:fe:83:10:ba:23:41:9a:e9:9b:a3:98:36:9a
TLS 1.2
192.168.56.103:49191
172.67.19.24:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=pastebin.com 51:a9:80:ce:77:62:b2:72:d2:05:30:60:fd:f4:39:60:f3:7d:ac:16
TLS 1.2
192.168.56.103:49196
54.192.175.109:443
C=CN, O=WoTrus CA Limited, CN=WoTrus DV Server CA [Run by the Issuer] CN=free.360totalsecurity.com 4f:76:01:e7:f6:e1:fc:0e:2f:fe:b0:89:6a:bc:1c:cf:63:d4:51:58
TLS 1.2
192.168.56.103:49199
104.153.233.177:443
C=US, O=Let's Encrypt, CN=R3 CN=backblazeb2.com c3:1e:e9:5b:82:2b:2d:13:7d:ed:23:05:c4:07:9a:19:b1:71:bd:d1
TLSv1
192.168.56.103:49183
23.43.165.153:443
C=US, O=Let's Encrypt, CN=R3 CN=download.winzip.com 30:9b:82:ca:d6:ce:c6:fe:83:10:ba:23:41:9a:e9:9b:a3:98:36:9a
TLSv1
192.168.56.103:49188
23.43.165.153:443
C=US, O=Let's Encrypt, CN=R3 CN=download.winzip.com 30:9b:82:ca:d6:ce:c6:fe:83:10:ba:23:41:9a:e9:9b:a3:98:36:9a
TLSv1
192.168.56.103:49241
104.26.9.59:443
C=US, O=Let's Encrypt, CN=R3 CN=myip.com 81:cd:fe:ad:24:9d:a3:fa:b9:34:be:53:2f:fe:1e:91:2a:ac:03:2a
TLS 1.3
192.168.56.103:49255
51.195.138.197:10943
None None None
TLSv1
192.168.56.103:49254
82.145.215.156:443
C=CN, O=WoTrus CA Limited, CN=WoTrus DV Server CA [Run by the Issuer] CN=static.360totalsecurity.com 2c:85:a3:e4:0e:fb:0e:8c:f8:04:1a:a9:02:b8:0d:ab:85:5f:b0:b3
TLSv1
192.168.56.103:49247
104.26.5.15:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=db-ip.com 1f:af:15:cd:f8:f8:ee:30:f9:6e:6e:54:bc:9a:a7:c7:77:70:6d:25
TLSv1
192.168.56.103:49287
172.67.213.39:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=fleur-de-lis.sbs b1:db:2b:5a:3b:10:70:c9:6e:f7:88:c4:d1:d7:96:7d:37:1f:d7:49
TLSv1
192.168.56.103:49291
18.64.13.203:443
C=US, O=Amazon, CN=Amazon RSA 2048 M01 CN=*.cloudfront.net fa:21:45:dc:4d:94:03:a3:09:77:51:78:4a:21:f2:c5:6d:94:be:52
TLSv1
192.168.56.103:49301
45.130.41.108:443
C=US, O=Let's Encrypt, CN=R3 CN=monoblocked.com 2c:d3:99:84:08:33:38:25:31:da:34:23:da:07:ec:a6:6f:e6:0a:ac
TLSv1
192.168.56.103:49306
87.240.132.78:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign ECC OV SSL CA 2018 C=RU, ST=Saint Petersburg, L=Saint Petersburg, O=V Kontakte LLC, CN=*.vk.com 65:c4:6f:80:24:02:e8:bf:a9:67:89:c3:4c:f8:46:77:d0:3b:df:fd
TLS 1.3
192.168.56.103:49258
51.15.65.182:14433
None None None
TLS 1.3
192.168.56.103:49257
104.20.3.235:443
None None None
TLSv1
192.168.56.103:49317
87.240.132.78:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign ECC OV SSL CA 2018 C=RU, ST=Saint Petersburg, L=Saint Petersburg, O=V Kontakte LLC, CN=*.vk.com 65:c4:6f:80:24:02:e8:bf:a9:67:89:c3:4c:f8:46:77:d0:3b:df:fd
TLSv1
192.168.56.103:49326
87.240.132.78:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign ECC OV SSL CA 2018 C=RU, ST=Saint Petersburg, L=Saint Petersburg, O=V Kontakte LLC, CN=*.vk.com 65:c4:6f:80:24:02:e8:bf:a9:67:89:c3:4c:f8:46:77:d0:3b:df:fd
TLSv1
192.168.56.103:49325
87.240.132.78:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign ECC OV SSL CA 2018 C=RU, ST=Saint Petersburg, L=Saint Petersburg, O=V Kontakte LLC, CN=*.vk.com 65:c4:6f:80:24:02:e8:bf:a9:67:89:c3:4c:f8:46:77:d0:3b:df:fd
TLSv1
192.168.56.103:49331
87.240.132.78:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign ECC OV SSL CA 2018 C=RU, ST=Saint Petersburg, L=Saint Petersburg, O=V Kontakte LLC, CN=*.vk.com 65:c4:6f:80:24:02:e8:bf:a9:67:89:c3:4c:f8:46:77:d0:3b:df:fd
TLSv1
192.168.56.103:49335
87.240.132.78:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign ECC OV SSL CA 2018 C=RU, ST=Saint Petersburg, L=Saint Petersburg, O=V Kontakte LLC, CN=*.vk.com 65:c4:6f:80:24:02:e8:bf:a9:67:89:c3:4c:f8:46:77:d0:3b:df:fd
TLSv1
192.168.56.103:49293
104.21.66.124:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=foxesjoy.com 98:61:17:75:9f:9b:34:ec:5e:dd:5b:36:49:5e:1b:7d:2d:22:18:22
TLSv1
192.168.56.103:49311
87.240.132.78:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign ECC OV SSL CA 2018 C=RU, ST=Saint Petersburg, L=Saint Petersburg, O=V Kontakte LLC, CN=*.vk.com 65:c4:6f:80:24:02:e8:bf:a9:67:89:c3:4c:f8:46:77:d0:3b:df:fd
TLS 1.2
192.168.56.103:49363
104.192.141.1:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA unknown=US, unknown=Delaware, unknown=Private Organization, serialNumber=3928449, C=US, ST=California, L=San Francisco, O=Atlassian US, Inc., CN=bitbucket.org bf:7c:47:a3:25:75:32:6e:c5:f8:ea:29:e6:bd:ba:2d:a7:99:28:78

Snort Alerts

No Snort Alerts