NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.67.128.126 Active Moloch
172.67.202.34 Active Moloch
185.216.214.225 Active Moloch
GET 200 https://garageserviceoperation.com/socket/?serviceCheckup
REQUEST
RESPONSE
GET 200 https://solutionhub.cc/socket/?serviceCheckup
REQUEST
RESPONSE
GET 200 https://garageserviceoperation.com/socket/?id=5BCCD56859158D5509DEF6EE93BD1D99E583188F0C221CF3349EDF15382DB8F4&us=1ACC94780D1E&mn=3AECB4580D1EC6312C&os=39C08968505B9841589FC5AB9AE31E8EF2DC42D055785DDC&bld=2DC8936D5355B11500CDF4E3BCD138B5AFFC62
REQUEST
RESPONSE
GET 200 https://garageserviceoperation.com/socket/?id=5BCCD56859158D5509DEF6EE93BD1D99E583188F0C221CF3349EDF15382DB8F4&us=1ACC94780D1E&mn=3AECB4580D1EC6312C&os=39C08968505B9841589FC5AB9AE31E8EF2DC42D055785DDC&bld=2DC8936D5355B11500CDF4E3BCD138B5AFFC62&tsk=5F9ADE
REQUEST
RESPONSE
GET 200 https://garageserviceoperation.com/socket/?id=5BCCD56859158D5509DEF6EE93BD1D99E583188F0C221CF3349EDF15382DB8F4&us=1ACC94780D1E&mn=3AECB4580D1EC6312C&os=39C08968505B9841589FC5AB9AE31E8EF2DC42D055785DDC&bld=2DC8936D5355B11500CDF4E3BCD138B5AFFC62&tsk=5F9ADF
REQUEST
RESPONSE
GET 200 https://garageserviceoperation.com/socket/?id=5BCCD56859158D5509DEF6EE93BD1D99E583188F0C221CF3349EDF15382DB8F4&us=1ACC94780D1E&mn=3AECB4580D1EC6312C&os=39C08968505B9841589FC5AB9AE31E8EF2DC42D055785DDC&bld=2DC8936D5355B11500CDF4E3BCD138B5AFFC62
REQUEST
RESPONSE
GET 200 http://185.216.214.225/freedom.exe
REQUEST
RESPONSE
GET 200 http://185.216.214.225/Jhiidutz.exe
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49161 -> 172.67.202.34:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.101:54148 -> 164.124.101.2:53 2054416 ET MALWARE ZharkBot CnC Domain in DNS Lookup (solutionhub .cc) A Network Trojan was detected
UDP 192.168.56.101:54148 -> 164.124.101.2:53 2027758 ET DNS Query for .cc TLD Potentially Bad Traffic
TCP 192.168.56.101:49163 -> 172.67.128.126:443 2054418 ET MALWARE Observed ZharkBot Domain (solutionhub .cc in TLS SNI) A Network Trojan was detected
TCP 192.168.56.101:49163 -> 172.67.128.126:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49164 -> 185.216.214.225:80 2054413 ET MALWARE ZharkBot User-Agent Observed A Network Trojan was detected
TCP 192.168.56.101:49164 -> 185.216.214.225:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49165 -> 172.67.202.34:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 185.216.214.225:80 -> 192.168.56.101:49164 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.216.214.225:80 -> 192.168.56.101:49164 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.216.214.225:80 -> 192.168.56.101:49164 2015745 ET INFO EXE CheckRemoteDebuggerPresent (Used in Malware Anti-Debugging) Misc activity
TCP 192.168.56.101:49164 -> 185.216.214.225:80 2054413 ET MALWARE ZharkBot User-Agent Observed A Network Trojan was detected
TCP 192.168.56.101:49164 -> 185.216.214.225:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.216.214.225:80 -> 192.168.56.101:49164 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49161
172.67.202.34:443
C=US, O=Google Trust Services, CN=WE1 CN=garageserviceoperation.com 9f:3e:b4:17:d0:54:94:2b:eb:35:8b:e9:ac:dd:e0:db:91:a5:35:e4
TLSv1
192.168.56.101:49163
172.67.128.126:443
C=US, O=Google Trust Services, CN=WE1 CN=solutionhub.cc a6:65:a4:77:51:a8:ca:dc:be:0c:0f:5b:5e:b4:fc:d4:cf:fb:24:09
TLSv1
192.168.56.101:49165
172.67.202.34:443
C=US, O=Google Trust Services, CN=WE1 CN=garageserviceoperation.com 9f:3e:b4:17:d0:54:94:2b:eb:35:8b:e9:ac:dd:e0:db:91:a5:35:e4

Snort Alerts

No Snort Alerts