NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
185.166.140.9 Active Moloch
185.215.113.67 Active Moloch
3.5.29.22 Active Moloch
GET 302 https://bitbucket.org/cloudappsoftware/vsc/downloads/GlitchClipper.exe
REQUEST
RESPONSE
GET 200 https://bbuseruploads.s3.amazonaws.com/0046344b-dbc7-4633-ba53-858e97e1e5e3/downloads/e035ed78-1bf0-4b5e-b1b5-5452a9c00962/GlitchClipper.exe?response-content-disposition=attachment%3B%20filename%3D%22GlitchClipper.exe%22&AWSAccessKeyId=ASIA6KOSE3BNNACKCQR3&Signature=0WJdjhH0SzZbZrg4qmi8SZhFZ1c%3D&x-amz-security-token=IQoJb3JpZ2luX2VjEHYaCXVzLWVhc3QtMSJGMEQCIEk%2BARBMnCUmBc%2B4pE%2FLa%2FXufm9B9egBuQycdCg0PqkwAiB%2FJLKBV7ZCeo6kUBQVydv1ivbUl3CHG7AFwB5Ve1dCDCqnAghvEAAaDDk4NDUyNTEwMTE0NiIMOVl5UzuIlAe9MITSKoQCVVtkn%2FpUoHlSF02oe4h2lTomBpfefAEuKnNpHAuBWN7prPQgMTqVZWNuxiUYi1unMhcX2MkjGlQ4VbMWl7v0XjUEneW8uXb3jjfbwjBpUu9%2FehfDZcef8pKMqekxlnv7uYSkEUIqP7%2FxJKYRxxNYkQgfMBtOIMlNk2D0XzSI0jaeRzup4oYiGftG6Y62slfk4MfdNZ4Fr0fmaicEs%2FVc6X2UkwpF%2FYlfORUKcjK1Oc%2BzjmQDyjw4IVi7N6%2FfR0UKtOnQ58AOpnyt1jeZe3V3I1ajPYwFppy2QHHWYbuI49pGZGqy1%2BNIIgPHME5oVe4FJPKixo3xpnPL3OXsaW31abikMj0wkqDhtQY6ngEuq0NPpIJ4eoRobfM450Na17ef9eAvuAhiGVozXMuLABm9hdgvUUFB2x6r2%2BVsNi7xP9DvAXE5f1tArFGJjVEs8wwsJVM%2BtqfacjbOLG8Dh1EyJfGJjgom65rQfHPRPyDA6UamyxSfg9WC9zkEq4nZwz2Wm3mc3k6cLzQfk8Mr6HumakVxDKW4UAqaYDtFt%2BzVIEkRzKYcxiogT%2FvSMA%3D%3D&Expires=1723356954
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 185.215.113.67:21405 -> 192.168.56.101:49163 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043233 ET INFO Microsoft net.tcp Connection Initialization Activity Potentially Bad Traffic
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2046045 ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) A Network Trojan was detected
TCP 185.215.113.67:21405 -> 192.168.56.101:49163 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 185.215.113.67:21405 -> 192.168.56.101:49163 2046056 ET MALWARE Redline Stealer/MetaStealer Family Activity (Response) A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49165 -> 185.166.140.9:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49166 -> 3.5.29.22:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.101:49163 -> 185.215.113.67:21405 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.101:49165
185.166.140.9:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA unknown=US, unknown=Delaware, unknown=Private Organization, serialNumber=3928449, C=US, ST=California, L=San Francisco, O=Atlassian US, Inc., CN=bitbucket.org 2a:b7:65:d0:f2:15:5d:a9:32:63:6f:1b:9d:6a:14:0b:b8:63:a1:17
TLS 1.2
192.168.56.101:49166
3.5.29.22:443
C=US, O=Amazon, CN=Amazon RSA 2048 M01 CN=*.s3.amazonaws.com 57:fe:c9:73:13:31:ca:2c:91:7f:05:c3:3b:16:ff:3f:1b:d8:7d:e2

Snort Alerts

No Snort Alerts