NetWork | ZeroBOX

Network Analysis

IP Address Status Action
109.61.83.245 Active Moloch
109.61.83.99 Active Moloch
164.124.101.2 Active Moloch
GET 200 https://mato3pdf.b-cdn.net/pdf
REQUEST
RESPONSE
GET 200 https://matozip1.b-cdn.net/K1.zip
REQUEST
RESPONSE
GET 200 https://matozip1.b-cdn.net/K2.zip
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49166 -> 109.61.83.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49169 -> 109.61.83.245:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49166
109.61.83.99:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.b-cdn.net fc:d9:3e:09:69:f5:9d:8a:aa:45:73:03:05:f1:8d:e4:5b:80:10:e4
TLSv1
192.168.56.101:49169
109.61.83.245:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.b-cdn.net fc:d9:3e:09:69:f5:9d:8a:aa:45:73:03:05:f1:8d:e4:5b:80:10:e4

Snort Alerts

No Snort Alerts