NetWork | ZeroBOX

Network Analysis

IP Address Status Action
149.154.167.220 Active Moloch
164.124.101.2 Active Moloch
185.213.208.196 Active Moloch
Name Response Post-Analysis Lookup
api.telegram.org 149.154.167.220
POST 200 http://185.213.208.196:8080/client/setClientConfig?clientId=test22-PC
REQUEST
RESPONSE
POST 200 http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC
REQUEST
RESPONSE
POST 200 http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC
REQUEST
RESPONSE
POST 200 http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC
REQUEST
RESPONSE
POST 200 http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC
REQUEST
RESPONSE
POST 200 http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC
REQUEST
RESPONSE
POST 200 http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC
REQUEST
RESPONSE
POST 200 http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC
REQUEST
RESPONSE
POST 200 http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC
REQUEST
RESPONSE
POST 200 http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC
REQUEST
RESPONSE
POST 200 http://185.213.208.196:8080/client/setClientStatus?clientId=test22-PC
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.103:52760 -> 164.124.101.2:53 2033966 ET HUNTING Telegram API Domain in DNS Lookup Misc activity
TCP 192.168.56.103:49216 -> 149.154.167.220:443 2033967 ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) Misc activity
TCP 192.168.56.103:49220 -> 185.213.208.196:80 2024792 ET POLICY Cryptocurrency Miner Checkin Potential Corporate Privacy Violation
TCP 192.168.56.103:49225 -> 185.213.208.196:8080 2221034 SURICATA HTTP Request unrecognized authorization method Generic Protocol Command Decode
TCP 192.168.56.103:49227 -> 185.213.208.196:8080 2221034 SURICATA HTTP Request unrecognized authorization method Generic Protocol Command Decode
TCP 192.168.56.103:49231 -> 185.213.208.196:8080 2221034 SURICATA HTTP Request unrecognized authorization method Generic Protocol Command Decode
TCP 192.168.56.103:49226 -> 185.213.208.196:8080 2221034 SURICATA HTTP Request unrecognized authorization method Generic Protocol Command Decode
TCP 192.168.56.103:49226 -> 185.213.208.196:8080 2011341 ET HUNTING Suspicious POST With Reference to WINDOWS Folder Possible Malware Infection A Network Trojan was detected
TCP 192.168.56.103:49233 -> 185.213.208.196:8080 2221034 SURICATA HTTP Request unrecognized authorization method Generic Protocol Command Decode
TCP 192.168.56.103:49229 -> 185.213.208.196:8080 2221034 SURICATA HTTP Request unrecognized authorization method Generic Protocol Command Decode
TCP 192.168.56.103:49234 -> 185.213.208.196:8080 2221034 SURICATA HTTP Request unrecognized authorization method Generic Protocol Command Decode
TCP 192.168.56.103:49230 -> 185.213.208.196:8080 2221034 SURICATA HTTP Request unrecognized authorization method Generic Protocol Command Decode
TCP 192.168.56.103:49228 -> 185.213.208.196:8080 2221034 SURICATA HTTP Request unrecognized authorization method Generic Protocol Command Decode
TCP 192.168.56.103:49232 -> 185.213.208.196:8080 2221034 SURICATA HTTP Request unrecognized authorization method Generic Protocol Command Decode
TCP 192.168.56.103:49235 -> 185.213.208.196:8080 2221034 SURICATA HTTP Request unrecognized authorization method Generic Protocol Command Decode
TCP 192.168.56.103:49220 -> 185.213.208.196:80 2024792 ET POLICY Cryptocurrency Miner Checkin Potential Corporate Privacy Violation

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.3
192.168.56.103:49216
149.154.167.220:443
None None None

Snort Alerts

No Snort Alerts