NetWork | ZeroBOX

Network Analysis

IP Address Status Action
109.172.114.38 Active Moloch
13.248.169.48 Active Moloch
13.248.213.45 Active Moloch
15.197.148.33 Active Moloch
164.124.101.2 Active Moloch
45.33.6.223 Active Moloch
POST 0 http://www.c7v88.top/v6ba/
REQUEST
RESPONSE
GET 200 http://www.c7v88.top/v6ba/?Dc08XbzK=nJtV0xxVonYleLmyEDIGF1GRtIwzCkYblW7ymF81wwUwIwWLid3Lr9yJw2X9YaLdXd5m2mo1Ok9Zsjhn2cbjbjbKzyMWkQ/uC8atz3xgP0khh14CmXxCw976WGM8OA3qn6b9QMQ=&0zGHU=_wG0Y4Ypi
REQUEST
RESPONSE
GET 200 http://www.sqlite.org/2021/sqlite-dll-win32-x86-3360000.zip
REQUEST
RESPONSE
POST 0 http://www.gotvoom.pro/yagd/
REQUEST
RESPONSE
GET 200 http://www.gotvoom.pro/yagd/?Dc08XbzK=uEwhQtN8d9WFSPX3vcuayxdpQqb8c/D/UpaKbFjD70Hg2gjUyZfmxqkinXZDMhG9GrAjDWM/1uaY6+kvF7tL6dHrL5YWOt4Y3qm+cyYTZ0PahKZdxCx3NJ3PVHCt9uZUePj8NnU=&0zGHU=_wG0Y4Ypi
REQUEST
RESPONSE
POST 404 http://www.juliakoppel.org/9wjj/
REQUEST
RESPONSE
GET 404 http://www.juliakoppel.org/9wjj/?Dc08XbzK=3pAkfJORuRgA59m5D3Ccm/a2baSHIB7ZSYQ2sF+aO2KWoeTfZIMk0oynOCre8P7un/vWh9+jgjqgzzA3WVgVD2gacPCD8hv2BH56l/1+ZEKULaKcv9mw30410B/1ELsaBxrqqsU=&0zGHU=_wG0Y4Ypi
REQUEST
RESPONSE
POST 0 http://www.askvanta.com/hhti/
REQUEST
RESPONSE
GET 200 http://www.askvanta.com/hhti/?Dc08XbzK=fjRDIvTmNEJNTuTcr8del2WQp76nRU4WKVyXC6Y4v5xhqnRixQ6zeb282ydBwPMN2XVyKj7Iv4bMnoolEkDYP7t2qkRY0AApd+m94wn/hzh5njk5AnE5TcuZf+A5lnJQAByr72U=&0zGHU=_wG0Y4Ypi
REQUEST
RESPONSE
POST 0 http://www.microsofr.fun/omnp/
REQUEST
RESPONSE
GET 200 http://www.microsofr.fun/omnp/?Dc08XbzK=GQSd+8pi26b7zJhOJIQXVD/h3K/inFV8tNrqSt2nhXuDaWJRns1If/+gRxLu2YDerAFibGs6WR2Qt7jgVufvyJTnycUzu8Yso7GmTERVlWVgi3ROCwKMdFc5FOB0p/g90EsMQlA=&0zGHU=_wG0Y4Ypi
REQUEST
RESPONSE
POST 0 http://www.eworld.org/18e1/
REQUEST
RESPONSE
GET 200 http://www.eworld.org/18e1/?Dc08XbzK=Pm7pKTMIYdCMccpB3xsAXFwsVOfU5MHbomtkvn/TIB3o6VHyHDbhzBEtFW9t5aJY+pX07Evew+XtfHVHXf6tslmSqwg1OujBiiUxK9iHVQ3RBf96wgYN9V5GQcLy17oB+M1M8tY=&0zGHU=_wG0Y4Ypi
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.101:59002 -> 164.124.101.2:53 2023883 ET DNS Query to a *.top domain - Likely Hostile Potentially Bad Traffic
TCP 192.168.56.101:49166 -> 15.197.148.33:80 2023882 ET INFO HTTP Request to a *.top domain Potentially Bad Traffic
TCP 192.168.56.101:49176 -> 109.172.114.38:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected
TCP 192.168.56.101:49167 -> 15.197.148.33:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected
TCP 192.168.56.101:49178 -> 15.197.148.33:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected
TCP 192.168.56.101:49174 -> 15.197.148.33:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected
TCP 192.168.56.101:49182 -> 13.248.169.48:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected
TCP 192.168.56.101:49180 -> 13.248.213.45:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts