NetWork | ZeroBOX

Network Analysis

IP Address Status Action
103.150.124.120 Active Moloch
104.18.38.233 Active Moloch
164.124.101.2 Active Moloch
GET 302 https://linhkiem.com/autoupdate_devcheckupdate.php
REQUEST
RESPONSE
GET 200 https://linhkiem.com/autoupdate_dev/launcher/index.html
REQUEST
RESPONSE
GET 200 https://linhkiem.com/
REQUEST
RESPONSE
GET 302 https://linhkiem.com/autoupdate_devAutoUpdate.exe
REQUEST
RESPONSE
GET 200 https://linhkiem.com/
REQUEST
RESPONSE
GET 200 https://linhkiem.com/autoupdate_dev/hostfile/update.php
REQUEST
RESPONSE
GET 200 https://linhkiem.com/autoupdate_dev/launcher/css/mainsite.css
REQUEST
RESPONSE
GET 200 https://linhkiem.com/autoupdate_dev/launcher/js/mainsite.js
REQUEST
RESPONSE
GET 200 https://linhkiem.com/autoupdate_dev/launcher/css/box-event.css
REQUEST
RESPONSE
GET 200 https://linhkiem.com/autoupdate_dev/launcher/css/style.css
REQUEST
RESPONSE
GET 200 https://linhkiem.com/autoupdate_dev/launcher/js/fadegallery.js
REQUEST
RESPONSE
GET 200 https://linhkiem.com/autoupdate_dev/launcher/js/commone942.js?clear=20140520
REQUEST
RESPONSE
GET 200 http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
REQUEST
RESPONSE
GET 200 http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49168 -> 103.150.124.120:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49173 -> 103.150.124.120:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49172 -> 103.150.124.120:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49164 -> 103.150.124.120:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49165 -> 103.150.124.120:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49168
103.150.124.120:443
None None None
TLSv1
192.168.56.101:49173
103.150.124.120:443
None None None
TLSv1
192.168.56.101:49172
103.150.124.120:443
None None None
TLSv1
192.168.56.101:49164
103.150.124.120:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=linhkiem.com 27:b4:aa:23:f9:9d:e8:22:7e:3a:6f:c7:eb:db:54:04:0b:4b:19:91
TLSv1
192.168.56.101:49165
103.150.124.120:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=linhkiem.com 27:b4:aa:23:f9:9d:e8:22:7e:3a:6f:c7:eb:db:54:04:0b:4b:19:91

Snort Alerts

No Snort Alerts