NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.94.216.97 Active Moloch
164.124.101.2 Active Moloch
45.60.49.158 Active Moloch
54.192.175.24 Active Moloch
GET 200 https://download.ebz.epson.net/dsc/du/01/DriverUpdateInfo?PR=SW&CTI=61&LG2=E2
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 45.60.49.158:443 -> 192.168.56.102:49181 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.102:49179 -> 45.60.49.158:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49180 -> 45.60.49.158:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.102:62846 -> 164.124.101.2:53 2027863 ET INFO Observed DNS Query to .biz TLD Potentially Bad Traffic
TCP 192.168.56.102:49175 -> 104.94.216.97:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49178 -> 54.192.175.24:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49175
104.94.216.97:443
C=US, O=DigiCert Inc, CN=DigiCert TLS RSA SHA256 2020 CA1 C=JP, ST=Nagano, L=Suwa-shi, O=SEIKO EPSON Corporation, CN=download2.ebz.epson.net 5f:21:3f:89:09:9a:3e:94:64:f2:15:11:4b:cf:84:f8:88:26:07:a1
TLSv1
192.168.56.102:49178
54.192.175.24:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=GeoTrust TLS RSA CA G1 C=JP, ST=Nagano, L=Suwa-Shi, O=SEIKO EPSON CORPORATION, CN=*.epson.biz 0c:c6:28:da:67:4b:c2:71:6d:e2:61:72:7d:82:d0:77:ea:bf:20:af

Snort Alerts

No Snort Alerts