NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
23.41.113.9 Active Moloch
23.52.33.11 Active Moloch
3.229.137.113 Active Moloch
54.231.194.33 Active Moloch
GET 200 https://lumu-updates.s3.amazonaws.com/build/Agent/win/2203318943744/desktop_single_agent-d47545d41d.exe
REQUEST
RESPONSE
GET 200 http://x1.i.lencr.org/
REQUEST
RESPONSE
GET 200 http://x1.i.lencr.org/
REQUEST
RESPONSE
POST 200 http://client-updates.lumu.io/service/update2
REQUEST
RESPONSE
POST 200 http://client-updates.lumu.io/service/update2?cup2key=1:aiyktIlMWjC_YDIJkn6k3-6XqffwkP2DaBfamURTQIA&cup2hreq=a4125a8074c9af063159ba78027272f9671c42488dea9878a9c5f20b4b7c8dc7
REQUEST
RESPONSE
POST 200 http://client-updates.lumu.io/service/update2
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49175 -> 3.229.137.113:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49179 -> 3.229.137.113:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49173 -> 3.229.137.113:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49188 -> 3.229.137.113:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49205 -> 54.231.194.33:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49191 -> 3.229.137.113:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49178 -> 3.229.137.113:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49189 -> 3.229.137.113:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49192 -> 3.229.137.113:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49214 -> 3.229.137.113:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49213 -> 3.229.137.113:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49215 -> 3.229.137.113:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49216 -> 3.229.137.113:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49200 -> 54.231.194.33:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.101:49175
3.229.137.113:443
C=US, O=Let's Encrypt, CN=E5 CN=client-updates.lumu.io ea:b7:e2:ce:8f:e9:1f:e8:31:28:68:38:19:6d:89:0f:7e:6b:be:8e
TLS 1.2
192.168.56.101:49179
3.229.137.113:443
C=US, O=Let's Encrypt, CN=E5 CN=client-updates.lumu.io ea:b7:e2:ce:8f:e9:1f:e8:31:28:68:38:19:6d:89:0f:7e:6b:be:8e
TLS 1.2
192.168.56.101:49173
3.229.137.113:443
C=US, O=Let's Encrypt, CN=E5 CN=client-updates.lumu.io ea:b7:e2:ce:8f:e9:1f:e8:31:28:68:38:19:6d:89:0f:7e:6b:be:8e
TLS 1.2
192.168.56.101:49188
3.229.137.113:443
C=US, O=Let's Encrypt, CN=E5 CN=client-updates.lumu.io ea:b7:e2:ce:8f:e9:1f:e8:31:28:68:38:19:6d:89:0f:7e:6b:be:8e
TLS 1.2
192.168.56.101:49205
54.231.194.33:443
C=US, O=Amazon, CN=Amazon RSA 2048 M01 CN=*.s3.amazonaws.com 57:fe:c9:73:13:31:ca:2c:91:7f:05:c3:3b:16:ff:3f:1b:d8:7d:e2
TLS 1.2
192.168.56.101:49191
3.229.137.113:443
C=US, O=Let's Encrypt, CN=E5 CN=client-updates.lumu.io ea:b7:e2:ce:8f:e9:1f:e8:31:28:68:38:19:6d:89:0f:7e:6b:be:8e
TLS 1.2
192.168.56.101:49178
3.229.137.113:443
C=US, O=Let's Encrypt, CN=E5 CN=client-updates.lumu.io ea:b7:e2:ce:8f:e9:1f:e8:31:28:68:38:19:6d:89:0f:7e:6b:be:8e
TLS 1.2
192.168.56.101:49189
3.229.137.113:443
C=US, O=Let's Encrypt, CN=E5 CN=client-updates.lumu.io ea:b7:e2:ce:8f:e9:1f:e8:31:28:68:38:19:6d:89:0f:7e:6b:be:8e
TLS 1.2
192.168.56.101:49192
3.229.137.113:443
C=US, O=Let's Encrypt, CN=E5 CN=client-updates.lumu.io ea:b7:e2:ce:8f:e9:1f:e8:31:28:68:38:19:6d:89:0f:7e:6b:be:8e
TLS 1.2
192.168.56.101:49214
3.229.137.113:443
C=US, O=Let's Encrypt, CN=E5 CN=client-updates.lumu.io ea:b7:e2:ce:8f:e9:1f:e8:31:28:68:38:19:6d:89:0f:7e:6b:be:8e
TLS 1.2
192.168.56.101:49213
3.229.137.113:443
C=US, O=Let's Encrypt, CN=E5 CN=client-updates.lumu.io ea:b7:e2:ce:8f:e9:1f:e8:31:28:68:38:19:6d:89:0f:7e:6b:be:8e
TLS 1.2
192.168.56.101:49215
3.229.137.113:443
C=US, O=Let's Encrypt, CN=E5 CN=client-updates.lumu.io ea:b7:e2:ce:8f:e9:1f:e8:31:28:68:38:19:6d:89:0f:7e:6b:be:8e
TLS 1.2
192.168.56.101:49216
3.229.137.113:443
C=US, O=Let's Encrypt, CN=E5 CN=client-updates.lumu.io ea:b7:e2:ce:8f:e9:1f:e8:31:28:68:38:19:6d:89:0f:7e:6b:be:8e

Snort Alerts

No Snort Alerts