Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
POST
200
http://77.91.77.82/Hun4Ko/index.php
REQUEST
RESPONSE
BODY
POST /Hun4Ko/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 77.91.77.82
Content-Length: 4
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Sat, 29 Jun 2024 06:36:46 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Refresh: 0; url = Login.php
POST
200
http://77.91.77.82/Hun4Ko/index.php
REQUEST
RESPONSE
BODY
POST /Hun4Ko/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 77.91.77.82
Content-Length: 160
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Sat, 29 Jun 2024 06:36:46 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
POST
200
http://77.91.77.82/Hun4Ko/index.php
REQUEST
RESPONSE
BODY
POST /Hun4Ko/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 77.91.77.82
Content-Length: 31
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Sat, 29 Jun 2024 06:38:04 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 77.91.77.82:80 -> 192.168.56.101:49164 | 2400007 | ET DROP Spamhaus DROP Listed Traffic Inbound group 8 | Misc Attack |
TCP 192.168.56.101:49170 -> 77.91.77.82:80 | 2044623 | ET MALWARE Amadey Bot Activity (POST) | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts