NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.67.215.45 Active Moloch
23.95.235.16 Active Moloch
91.92.254.29 Active Moloch
Name Response Post-Analysis Lookup
uploaddeimagens.com.br 104.21.45.138
GET 200 https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235
REQUEST
RESPONSE
GET 200 http://23.95.235.16/33011/greatideaforfollowers.gif
REQUEST
RESPONSE
GET 200 http://91.92.254.29/Users_API/syscore/file_xgep41gp.dyp.txt
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 91.92.254.29:80 -> 192.168.56.101:49164 2400012 ET DROP Spamhaus DROP Listed Traffic Inbound group 13 Misc Attack
TCP 91.92.254.29:80 -> 192.168.56.101:49164 2049038 ET MALWARE Malicious Base64 Encoded Payload In Image A Network Trojan was detected
TCP 192.168.56.101:49166 -> 172.67.215.45:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 91.92.254.29:80 -> 192.168.56.101:49164 2012325 ET WEB_CLIENT Obfuscated Javascript // ptth Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49166
172.67.215.45:443
C=US, O=Google Trust Services, CN=WE1 CN=uploaddeimagens.com.br 73:a9:e0:a5:b1:5f:db:89:38:94:4f:97:4d:68:78:e4:59:c5:9f:a5

Snort Alerts

No Snort Alerts