NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.66.124 Active Moloch
104.237.62.213 Active Moloch
104.26.4.15 Active Moloch
121.254.136.9 Active Moloch
131.153.76.130 Active Moloch
149.154.167.99 Active Moloch
162.159.130.233 Active Moloch
164.124.101.2 Active Moloch
172.67.132.113 Active Moloch
172.67.75.163 Active Moloch
176.111.174.109 Active Moloch
34.117.59.81 Active Moloch
77.105.133.27 Active Moloch
78.46.255.249 Active Moloch
79.137.192.13 Active Moloch
89.111.172.64 Active Moloch
91.103.252.177 Active Moloch
94.232.45.38 Active Moloch
96.7.99.225 Active Moloch

GET 200 https://db-ip.com/demo/home.php?s=
REQUEST
RESPONSE
GET 200 https://iplogger.org/1nhuM4.js
REQUEST
RESPONSE
GET 200 https://steamcommunity.com/profiles/76561199743486170
REQUEST
RESPONSE
GET 200 http://91.103.252.177/api/crazyfish.php
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
POST 200 http://91.103.252.177/api/twofish.php
REQUEST
RESPONSE
HEAD 200 http://79.137.192.13/prog/669a659129ee2_crypted.exe#1
REQUEST
RESPONSE
HEAD 200 http://79.137.192.13/prog/669b5b78252ea_googlesoft.exe#mene
REQUEST
RESPONSE
HEAD 200 http://77.105.133.27/download/th/space.php
REQUEST
RESPONSE
HEAD 200 http://77.105.133.27/download/123p.exe
REQUEST
RESPONSE
HEAD 200 http://176.111.174.109/psyzh
REQUEST
RESPONSE
HEAD 200 http://94.232.45.38/eee01/eee01.exe
REQUEST
RESPONSE
HEAD 302 http://89.111.172.64/d/385132
REQUEST
RESPONSE
HEAD 200 http://79.137.192.13/prog/6692518842cd4_BotClient.exe
REQUEST
RESPONSE
HEAD 200 http://79.137.192.13/prog/6696621cecc83_crypted.exe#xin
REQUEST
RESPONSE
GET 200 http://79.137.192.13/prog/669a659129ee2_crypted.exe#1
REQUEST
RESPONSE
GET 200 http://79.137.192.13/prog/669b5b78252ea_googlesoft.exe#mene
REQUEST
RESPONSE
GET 200 http://77.105.133.27/download/th/space.php
REQUEST
RESPONSE
GET 200 http://77.105.133.27/download/123p.exe
REQUEST
RESPONSE
GET 200 http://94.232.45.38/eee01/eee01.exe
REQUEST
RESPONSE
GET 200 http://176.111.174.109/psyzh
REQUEST
RESPONSE
GET 302 http://89.111.172.64/d/385132
REQUEST
RESPONSE
GET 200 http://79.137.192.13/prog/6692518842cd4_BotClient.exe
REQUEST
RESPONSE
GET 200 http://79.137.192.13/prog/6696621cecc83_crypted.exe#xin
REQUEST
RESPONSE
POST 200 http://91.103.252.177/api/twofish.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.101:53004 -> 164.124.101.2:53 2047702 ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup Misc activity
TCP 192.168.56.101:49166 -> 104.237.62.213:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.101:49166 -> 104.237.62.213:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49166 -> 104.237.62.213:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
UDP 192.168.56.101:55146 -> 164.124.101.2:53 2054168 ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) Device Retrieving External IP Address Detected
TCP 104.237.62.213:443 -> 192.168.56.101:49167 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 77.105.133.27:80 -> 192.168.56.101:49178 2400007 ET DROP Spamhaus DROP Listed Traffic Inbound group 8 Misc Attack
TCP 192.168.56.101:49168 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.101:49168 -> 34.117.59.81:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49168 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.101:49178 -> 77.105.133.27:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49164 -> 172.67.75.163:443 2042969 ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) Device Retrieving External IP Address Detected
TCP 192.168.56.101:49164 -> 172.67.75.163:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 79.137.192.13:80 -> 192.168.56.101:49174 2400007 ET DROP Spamhaus DROP Listed Traffic Inbound group 8 Misc Attack
TCP 176.111.174.109:80 -> 192.168.56.101:49175 2400029 ET DROP Spamhaus DROP Listed Traffic Inbound group 30 Misc Attack
TCP 192.168.56.101:49170 -> 104.26.4.15:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49182 -> 162.159.130.233:443 2035464 ET INFO Observed Discord Domain (discordapp .com in TLS SNI) Misc activity
TCP 192.168.56.101:49182 -> 162.159.130.233:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49182 -> 162.159.130.233:443 2035464 ET INFO Observed Discord Domain (discordapp .com in TLS SNI) Misc activity
TCP 192.168.56.101:49183 -> 162.159.130.233:443 2035464 ET INFO Observed Discord Domain (discordapp .com in TLS SNI) Misc activity
TCP 192.168.56.101:49183 -> 162.159.130.233:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49181 -> 104.21.66.124:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.101:49183 -> 162.159.130.233:443 2035464 ET INFO Observed Discord Domain (discordapp .com in TLS SNI) Misc activity
TCP 192.168.56.101:49181 -> 104.21.66.124:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49179 -> 94.232.45.38:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49192 -> 104.21.66.124:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49178 -> 77.105.133.27:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49179 -> 94.232.45.38:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 79.137.192.13:80 -> 192.168.56.101:49174 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 79.137.192.13:80 -> 192.168.56.101:49174 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49185 -> 104.21.66.124:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 89.111.172.64:80 -> 192.168.56.101:49177 2049228 ET HUNTING Redirect to Discord Attachment Download Misc activity
UDP 192.168.56.101:54883 -> 164.124.101.2:53 2035466 ET INFO Observed Discord Domain in DNS Lookup (discordapp .com) Misc activity
TCP 192.168.56.101:49188 -> 162.159.130.233:443 2035464 ET INFO Observed Discord Domain (discordapp .com in TLS SNI) Misc activity
TCP 192.168.56.101:49188 -> 162.159.130.233:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49188 -> 162.159.130.233:443 2035464 ET INFO Observed Discord Domain (discordapp .com in TLS SNI) Misc activity
TCP 176.111.174.109:80 -> 192.168.56.101:49175 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 176.111.174.109:80 -> 192.168.56.101:49175 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 176.111.174.109:80 -> 192.168.56.101:49175 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.101:49180 -> 104.21.66.124:80 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.101:49180 -> 104.21.66.124:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49173 -> 79.137.192.13:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 79.137.192.13:80 -> 192.168.56.101:49173 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 79.137.192.13:80 -> 192.168.56.101:49173 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49189 -> 162.159.130.233:443 2035464 ET INFO Observed Discord Domain (discordapp .com in TLS SNI) Misc activity
TCP 192.168.56.101:49189 -> 162.159.130.233:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49189 -> 162.159.130.233:443 2035464 ET INFO Observed Discord Domain (discordapp .com in TLS SNI) Misc activity
TCP 77.105.133.27:80 -> 192.168.56.101:49178 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 77.105.133.27:80 -> 192.168.56.101:49178 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 94.232.45.38:80 -> 192.168.56.101:49179 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 94.232.45.38:80 -> 192.168.56.101:49179 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 94.232.45.38:80 -> 192.168.56.101:49179 2015744 ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) Misc activity
TCP 77.105.133.27:80 -> 192.168.56.101:49176 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 77.105.133.27:80 -> 192.168.56.101:49176 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 77.105.133.27:80 -> 192.168.56.101:49176 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.101:49173 -> 79.137.192.13:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 79.137.192.13:80 -> 192.168.56.101:49173 2014819 ET INFO Packed Executable Download Misc activity
TCP 79.137.192.13:80 -> 192.168.56.101:49173 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 77.105.133.27:50505 -> 192.168.56.101:49200 2046266 ET MALWARE [ANY.RUN] RisePro TCP (Token) A Network Trojan was detected
TCP 192.168.56.101:49200 -> 77.105.133.27:50505 2046269 ET MALWARE [ANY.RUN] RisePro TCP (Activity) A Network Trojan was detected
TCP 192.168.56.101:49200 -> 77.105.133.27:50505 2049060 ET MALWARE RisePro TCP Heartbeat Packet A Network Trojan was detected
TCP 192.168.56.101:49214 -> 149.154.167.99:443 2041933 ET INFO Observed Telegram Domain (t .me in TLS SNI) Misc activity
TCP 192.168.56.101:49214 -> 149.154.167.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 149.154.167.99:443 -> 192.168.56.101:49216 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49214 -> 149.154.167.99:443 2041933 ET INFO Observed Telegram Domain (t .me in TLS SNI) Misc activity
TCP 192.168.56.101:49218 -> 96.7.99.225:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 78.46.255.249:443 -> 192.168.56.101:49221 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
UDP 192.168.56.101:52753 -> 164.124.101.2:53 2036289 ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) Crypto Currency Mining Activity Detected
TCP 192.168.56.101:49215 -> 149.154.167.99:443 2041933 ET INFO Observed Telegram Domain (t .me in TLS SNI) Misc activity
TCP 192.168.56.101:49215 -> 149.154.167.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49215 -> 149.154.167.99:443 2041933 ET INFO Observed Telegram Domain (t .me in TLS SNI) Misc activity
UDP 192.168.56.101:52815 -> 164.124.101.2:53 2035948 ET POLICY IP Check Domain (iplogger .org in DNS Lookup) Potential Corporate Privacy Violation
TCP 192.168.56.101:49199 -> 172.67.132.113:443 2035949 ET POLICY IP Check Domain (iplogger .org in TLS SNI) Potential Corporate Privacy Violation
TCP 192.168.56.101:49199 -> 172.67.132.113:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49182 -> 162.159.130.233:443 2035464 ET INFO Observed Discord Domain (discordapp .com in TLS SNI) Misc activity
TCP 89.111.172.64:80 -> 192.168.56.101:49177 2049228 ET HUNTING Redirect to Discord Attachment Download Misc activity
TCP 192.168.56.101:49214 -> 149.154.167.99:443 2041933 ET INFO Observed Telegram Domain (t .me in TLS SNI) Misc activity
TCP 192.168.56.101:49215 -> 149.154.167.99:443 2041933 ET INFO Observed Telegram Domain (t .me in TLS SNI) Misc activity
TCP 192.168.56.101:49188 -> 162.159.130.233:443 2035464 ET INFO Observed Discord Domain (discordapp .com in TLS SNI) Misc activity

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49164
172.67.75.163:443
C=US, O=Let's Encrypt, CN=R3 CN=myip.com 87:d2:90:92:b6:6a:56:3c:25:f1:ae:56:52:d9:2b:ac:16:44:bb:bc
TLSv1
192.168.56.101:49170
104.26.4.15:443
C=US, O=Google Trust Services, CN=WR1 CN=db-ip.com 61:a1:85:30:8f:04:68:e2:7b:34:d7:83:41:95:57:f4:94:c0:17:c3
TLSv1
192.168.56.101:49192
104.21.66.124:443
C=US, O=Google Trust Services, CN=WE1 CN=foxesjoy.com 7c:98:d5:06:20:bf:d9:af:30:ac:9a:78:12:fe:95:20:93:e7:d1:f0
TLSv1
192.168.56.101:49218
96.7.99.225:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA unknown=US, unknown=Washington, unknown=Private Organization, serialNumber=602 290 773, C=US, ST=Washington, L=Bellevue, O=Valve Corp, CN=store.steampowered.com 10:20:2b:ee:30:69:cc:b6:ac:5e:47:04:71:ca:b0:75:78:51:58:f5
TLS 1.3
192.168.56.101:49226
131.153.76.130:443
None None None
TLSv1
192.168.56.101:49199
172.67.132.113:443
C=US, O=Google Trust Services, CN=WE1 CN=iplogger.org 08:dd:39:df:d9:24:0d:d7:6f:12:c0:8e:bc:78:4a:76:c1:28:90:07

Snort Alerts

No Snort Alerts