NetWork | ZeroBOX

Network Analysis

IP Address Status Action
109.61.83.243 Active Moloch
164.124.101.2 Active Moloch
169.150.225.41 Active Moloch
GET 200 https://mato3f.b-cdn.net/town-fil
REQUEST
RESPONSE
GET 200 https://matozip1.b-cdn.net/K1.zip
REQUEST
RESPONSE
GET 200 https://matozip1.b-cdn.net/K2.zip
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49169 -> 169.150.225.41:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49166 -> 109.61.83.243:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49169
169.150.225.41:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.b-cdn.net fc:d9:3e:09:69:f5:9d:8a:aa:45:73:03:05:f1:8d:e4:5b:80:10:e4
TLSv1
192.168.56.101:49166
109.61.83.243:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.b-cdn.net fc:d9:3e:09:69:f5:9d:8a:aa:45:73:03:05:f1:8d:e4:5b:80:10:e4

Snort Alerts

No Snort Alerts