NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
23.41.113.9 Active Moloch
89.150.40.43 Active Moloch
GET 200 http://x1.i.lencr.org/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49165 -> 89.150.40.43:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49162 -> 89.150.40.43:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49167 -> 89.150.40.43:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49165
89.150.40.43:443
C=US, O=Let's Encrypt, CN=R11 CN=*.session-out.com 52:ef:0a:05:6a:3d:2b:7c:d3:af:dd:15:76:7f:18:1b:44:f4:24:9a
TLSv1
192.168.56.102:49162
89.150.40.43:443
C=US, O=Let's Encrypt, CN=R11 CN=*.session-out.com 52:ef:0a:05:6a:3d:2b:7c:d3:af:dd:15:76:7f:18:1b:44:f4:24:9a
TLSv1
192.168.56.102:49167
89.150.40.43:443
None None None

Snort Alerts

No Snort Alerts