NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.26.2.16 Active Moloch
104.26.3.16 Active Moloch
164.124.101.2 Active Moloch
172.67.75.40 Active Moloch
GET 200 https://app.fortect.com/events/events.php?sessionid=f1b9f267bedbe168cfcb3bfb1c77135727786305941307e07605b667634ea6d5&minorsessionid=1a01b5d2-41ab-4436-85e7-b2c4a1bb783c&os=7&build=7601&architecture=64&version=6502&id=INSST&param=Downloader%20Started<*>
REQUEST
RESPONSE
GET 200 https://app.fortect.com/ev-install-start/ev-install-start.php?sessionid=f1b9f267bedbe168cfcb3bfb1c77135727786305941307e07605b667634ea6d5&minorsessionid=1a01b5d2-41ab-4436-85e7-b2c4a1bb783c&os=7&build=7601&architecture=64&version=6502
REQUEST
RESPONSE
GET 200 https://app.fortect.com/events/version.php?data=json&sessionid=f1b9f267bedbe168cfcb3bfb1c77135727786305941307e07605b667634ea6d5&minorsessionid=1a01b5d2-41ab-4436-85e7-b2c4a1bb783c&os=7&build=7601&architecture=64&version=6502&installed=
REQUEST
RESPONSE
GET 200 https://app.fortect.com/events/events.php?sessionid=f1b9f267bedbe168cfcb3bfb1c77135727786305941307e07605b667634ea6d5&minorsessionid=1a01b5d2-41ab-4436-85e7-b2c4a1bb783c&os=7&build=7601&architecture=64&version=6502&id=LANG&param=1042<*>ko<*>
REQUEST
RESPONSE
GET 200 https://app.fortect.com/events/events.php?sessionid=f1b9f267bedbe168cfcb3bfb1c77135727786305941307e07605b667634ea6d5&minorsessionid=1a01b5d2-41ab-4436-85e7-b2c4a1bb783c&os=7&build=7601&architecture=64&version=6502&id=INSVR&param=6.5.0.2<*>
REQUEST
RESPONSE
GET 200 https://cloud.fortect.com/app/installation/engine/6502/FortectSetup64.7z
REQUEST
RESPONSE
GET 200 https://cloud.fortect.com/app/installation/service/6502/FortectProtection64.7z
REQUEST
RESPONSE
GET 200 https://app.fortect.com/events/evt_scan.php?sessionid=f1b9f267bedbe168cfcb3bfb1c77135727786305941307e07605b667634ea6d5&minorsessionid=1a01b5d2-41ab-4436-85e7-b2c4a1bb783c&os=7&build=7601&architecture=64&version=6502&id=AUINS&param=service%20installed<*>0<*>6.5.0.2<*>
REQUEST
RESPONSE
GET 200 https://app.fortect.com/events/events.php?sessionid=f1b9f267bedbe168cfcb3bfb1c77135727786305941307e07605b667634ea6d5&minorsessionid=1a01b5d2-41ab-4436-85e7-b2c4a1bb783c&os=7&build=7601&architecture=64&version=6502&id=PKAOK&param=ServiceRunning<*>
REQUEST
RESPONSE
GET 200 https://app.fortect.com/ev-install-end/ev-install-end.php?sessionid=f1b9f267bedbe168cfcb3bfb1c77135727786305941307e07605b667634ea6d5&minorsessionid=1a01b5d2-41ab-4436-85e7-b2c4a1bb783c&os=7&build=7601&architecture=64&version=6502
REQUEST
RESPONSE
GET 200 https://app.fortect.com/events/events.php?sessionid=f1b9f267bedbe168cfcb3bfb1c77135727786305941307e07605b667634ea6d5&minorsessionid=1a01b5d2-41ab-4436-85e7-b2c4a1bb783c&os=7&build=7601&architecture=64&version=6502&id=INSRN&param=6.5.0.2<*>
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49167 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49167 -> 104.26.2.16:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49167 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49167 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49169 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49169 -> 104.26.2.16:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49169 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49171 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49171 -> 104.26.2.16:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49171 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49169 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49171 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
UDP 192.168.56.102:63709 -> 164.124.101.2:53 2048947 ET ADWARE_PUP Observed DNS Query to PC Optimizer Software Domain (fortect .com) Possibly Unwanted Program Detected
TCP 192.168.56.102:49164 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49164 -> 104.26.2.16:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49164 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49163 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49164 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49163 -> 104.26.2.16:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49172 -> 172.67.75.40:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49172 -> 172.67.75.40:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.102:62846 -> 164.124.101.2:53 2048947 ET ADWARE_PUP Observed DNS Query to PC Optimizer Software Domain (fortect .com) Possibly Unwanted Program Detected
TCP 192.168.56.102:49357 -> 172.67.75.40:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49357 -> 172.67.75.40:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49357 -> 172.67.75.40:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49357 -> 172.67.75.40:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49366 -> 104.26.3.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49368 -> 104.26.3.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49367 -> 104.26.3.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49383 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49383 -> 104.26.2.16:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49377 -> 104.26.3.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49383 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49383 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49374 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49374 -> 104.26.2.16:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49374 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49374 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49365 -> 104.26.3.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49369 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49369 -> 104.26.2.16:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49369 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49369 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
UDP 192.168.56.102:56630 -> 164.124.101.2:53 2048947 ET ADWARE_PUP Observed DNS Query to PC Optimizer Software Domain (fortect .com) Possibly Unwanted Program Detected
TCP 192.168.56.102:49370 -> 104.26.3.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49373 -> 104.26.3.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49380 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49380 -> 104.26.2.16:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49380 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected
TCP 192.168.56.102:49380 -> 104.26.2.16:443 2048948 ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI) Possibly Unwanted Program Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49167
104.26.2.16:443
None None None
TLSv1
192.168.56.102:49169
104.26.2.16:443
None None None
TLSv1
192.168.56.102:49171
104.26.2.16:443
None None None
TLSv1
192.168.56.102:49164
104.26.2.16:443
None None None
TLSv1
192.168.56.102:49163
104.26.2.16:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=fortect.com e1:5a:ec:76:ca:40:34:3d:d4:20:e8:4f:e7:70:c6:f4:db:f9:92:2e
TLSv1
192.168.56.102:49172
172.67.75.40:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=fortect.com e1:5a:ec:76:ca:40:34:3d:d4:20:e8:4f:e7:70:c6:f4:db:f9:92:2e
TLSv1
192.168.56.102:49357
172.67.75.40:443
None None None
TLS 1.3
192.168.56.102:49366
104.26.3.16:443
None None None
TLS 1.3
192.168.56.102:49368
104.26.3.16:443
None None None
TLS 1.3
192.168.56.102:49367
104.26.3.16:443
None None None
TLS 1.3
192.168.56.102:49377
104.26.3.16:443
None None None
TLSv1
192.168.56.102:49383
104.26.2.16:443
None None None
TLSv1
192.168.56.102:49374
104.26.2.16:443
None None None
TLS 1.3
192.168.56.102:49365
104.26.3.16:443
None None None
TLSv1
192.168.56.102:49369
104.26.2.16:443
None None None
TLS 1.3
192.168.56.102:49370
104.26.3.16:443
None None None
TLS 1.3
192.168.56.102:49373
104.26.3.16:443
None None None
TLSv1
192.168.56.102:49380
104.26.2.16:443
None None None

Snort Alerts

No Snort Alerts