NetWork | ZeroBOX

Network Analysis

IP Address Status Action
15.197.148.33 Active Moloch
156.237.204.118 Active Moloch
164.124.101.2 Active Moloch
172.67.222.36 Active Moloch
18.166.41.103 Active Moloch
3.33.130.190 Active Moloch
35.213.130.57 Active Moloch
45.33.6.223 Active Moloch
85.159.66.93 Active Moloch

No traffic

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49177 -> 3.33.130.190:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected
TCP 192.168.56.101:49168 -> 172.67.222.36:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected
TCP 192.168.56.101:49183 -> 15.197.148.33:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected
TCP 192.168.56.101:49175 -> 156.237.204.118:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected
TCP 192.168.56.101:49179 -> 3.33.130.190:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected
TCP 192.168.56.101:49185 -> 85.159.66.93:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected
TCP 192.168.56.101:49181 -> 18.166.41.103:80 2050745 ET MALWARE FormBook CnC Checkin (GET) M5 Malware Command and Control Activity Detected
TCP 192.168.56.101:49186 -> 35.213.130.57:80 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts