NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.67.154.165 Active Moloch
GET 200 https://ddfcbb9325637bcdeff.mxttbszhh1.free.hr/oauth/pdf/Monetary_Funding_Sheet_2024.js
REQUEST
RESPONSE
GET 200 https://ddfcbb9325637bcdeff.mxttbszhh1.free.hr/oauth/pdf/Monetary_Funding_Sheet_2024.pdf
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49162 -> 172.67.154.165:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49162
172.67.154.165:443
C=US, O=Google Trust Services, CN=WE1 CN=mxttbszhh1.free.hr ee:0f:6a:a4:31:ca:d0:e1:4e:db:47:f2:a8:49:c6:25:75:68:16:1f

Snort Alerts

No Snort Alerts