NetWork | ZeroBOX

Network Analysis

IP Address Status Action
154.216.17.170 Active Moloch
147.45.60.44 Active Moloch
164.124.101.2 Active Moloch
185.215.113.16 Active Moloch
185.215.113.17 Active Moloch
185.215.113.19 Active Moloch
185.215.113.26 Active Moloch
195.133.13.230 Active Moloch
195.133.48.136 Active Moloch
52.212.52.84 Active Moloch
95.179.250.45 Active Moloch
23.207.177.83 Active Moloch
34.117.59.81 Active Moloch
95.216.143.20 Active Moloch
POST 200 http://185.215.113.16/Jo89Ku7d/index.php
REQUEST
RESPONSE
POST 200 http://185.215.113.16/Jo89Ku7d/index.php
REQUEST
RESPONSE
GET 200 http://ddl.safone.dev/3823166/crypted.exe?hash=AgADZl
REQUEST
RESPONSE
POST 200 http://185.215.113.16/Jo89Ku7d/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.16/inc/crypteda.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.16/Jo89Ku7d/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.26/Nework.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.16/Jo89Ku7d/index.php
REQUEST
RESPONSE
POST 200 http://185.215.113.26/Dem7kTu/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.16/inc/stealc_default2.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.26/Dem7kTu/index.php
REQUEST
RESPONSE
GET 200 http://stagingbyvdveen.com/get/setup2.exe
REQUEST
RESPONSE
GET 200 http://185.215.113.17/
REQUEST
RESPONSE
POST 200 http://185.215.113.16/Jo89Ku7d/index.php
REQUEST
RESPONSE
GET 200 http://ddl.safone.dev/3846636/Set-up.exe?hash=AgADDB
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.26/Dem7kTu/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.17/f1ddeb6592c03206/sqlite3.dll
REQUEST
RESPONSE
GET 200 http://154.216.17.170/joffer2.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.26/Dem7kTu/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.17/f1ddeb6592c03206/freebl3.dll
REQUEST
RESPONSE
POST 200 http://185.215.113.16/Jo89Ku7d/index.php
REQUEST
RESPONSE
GET 200 http://ddl.safone.dev/3846244/1.exe?hash=AgADek
REQUEST
RESPONSE
GET 200 http://185.215.113.17/f1ddeb6592c03206/mozglue.dll
REQUEST
RESPONSE
GET 200 http://185.215.113.17/f1ddeb6592c03206/msvcp140.dll
REQUEST
RESPONSE
GET 200 http://185.215.113.17/f1ddeb6592c03206/nss3.dll
REQUEST
RESPONSE
POST 200 http://185.215.113.16/Jo89Ku7d/index.php
REQUEST
RESPONSE
GET 200 http://ddl.safone.dev/3846638/GetSys.exe?hash=AgADAh
REQUEST
RESPONSE
GET 200 http://185.215.113.17/f1ddeb6592c03206/softokn3.dll
REQUEST
RESPONSE
GET 200 http://185.215.113.17/f1ddeb6592c03206/vcruntime140.dll
REQUEST
RESPONSE
POST 200 http://sevxv17pt.top/v1/upload.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://fivexv5vs.top/v1/upload.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://185.215.113.17/2fb6c2cc8dce150a.php
REQUEST
RESPONSE
POST 200 http://sevxv17pt.top/v1/upload.php
REQUEST
RESPONSE
POST 200 http://fivexv5vs.top/v1/upload.php
REQUEST
RESPONSE
POST 200 http://sevxv17pt.top/v1/upload.php
REQUEST
RESPONSE
POST 200 http://185.215.113.16/Jo89Ku7d/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.16/inc/Amadeus.exe
REQUEST
RESPONSE
POST 200 http://fivexv5vs.top/v1/upload.php
REQUEST
RESPONSE
GET 200 http://ddl.safone.dev/3840509/build.exe?hash=AgADNB
REQUEST
RESPONSE
GET 200 http://ddl.safone.dev/3850492/seidr_build.exe?hash=AgADjB
REQUEST
RESPONSE
GET 200 http://x1.i.lencr.org/
REQUEST
RESPONSE
GET 200 http://185.215.113.19/ProlongedPortable.dll
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 185.215.113.16:80 -> 192.168.56.103:49164 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 52.212.52.84:80 -> 192.168.56.103:49165 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 52.212.52.84:80 -> 192.168.56.103:49165 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 52.212.52.84:80 -> 192.168.56.103:49165 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.103:49168 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.16:80 -> 192.168.56.103:49168 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.16:80 -> 192.168.56.103:49168 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.215.113.26:80 -> 192.168.56.103:49178 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 52.212.52.84:80 -> 192.168.56.103:49183 2014819 ET INFO Packed Executable Download Misc activity
TCP 52.212.52.84:80 -> 192.168.56.103:49183 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 52.212.52.84:80 -> 192.168.56.103:49183 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 52.212.52.84:80 -> 192.168.56.103:49183 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49178 -> 185.215.113.26:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49185 -> 154.216.17.170:80 2017598 ET MALWARE Possible Kelihos.F EXE Download Common Structure A Network Trojan was detected
TCP 192.168.56.103:49185 -> 154.216.17.170:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 154.216.17.170:80 -> 192.168.56.103:49185 2014819 ET INFO Packed Executable Download Misc activity
TCP 154.216.17.170:80 -> 192.168.56.103:49185 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.216.17.170:80 -> 192.168.56.103:49185 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 154.216.17.170:80 -> 192.168.56.103:49185 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49174 -> 185.215.113.26:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.26:80 -> 192.168.56.103:49174 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.26:80 -> 192.168.56.103:49174 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.26:80 -> 192.168.56.103:49174 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.17:80 -> 192.168.56.103:49182 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 147.45.60.44:80 -> 192.168.56.103:49180 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 147.45.60.44:80 -> 192.168.56.103:49180 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2044243 ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in Malware Command and Control Activity Detected
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2044244 ET MALWARE Win32/Stealc Requesting browsers Config from C2 Malware Command and Control Activity Detected
TCP 185.215.113.17:80 -> 192.168.56.103:49182 2051828 ET MALWARE Win32/Stealc Active C2 Responding with browsers Config M1 Malware Command and Control Activity Detected
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2044246 ET MALWARE Win32/Stealc Requesting plugins Config from C2 Malware Command and Control Activity Detected
TCP 185.215.113.17:80 -> 192.168.56.103:49182 2051831 ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 Malware Command and Control Activity Detected
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2044248 ET MALWARE Win32/Stealc Submitting System Information to C2 Malware Command and Control Activity Detected
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2044301 ET HUNTING HTTP GET Request for sqlite3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 185.215.113.17:80 -> 192.168.56.103:49182 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.17:80 -> 192.168.56.103:49182 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.103:49178 -> 185.215.113.26:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2044303 ET HUNTING HTTP GET Request for freebl3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2044302 ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2044305 ET HUNTING HTTP GET Request for nss3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49195 -> 195.133.13.230:80 2054350 ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 A Network Trojan was detected
TCP 192.168.56.103:49195 -> 195.133.13.230:80 2023882 ET INFO HTTP Request to a *.top domain Potentially Bad Traffic
UDP 192.168.56.103:53673 -> 164.124.101.2:53 2023883 ET DNS Query to a *.top domain - Likely Hostile Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2044306 ET HUNTING HTTP GET Request for softokn3.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 185.215.113.17:80 2044307 ET HUNTING HTTP GET Request for vcruntime140.dll - Possible Infostealer Activity A suspicious filename was detected
TCP 192.168.56.103:49202 -> 195.133.48.136:80 2054350 ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 A Network Trojan was detected
TCP 192.168.56.103:49195 -> 195.133.13.230:80 2054350 ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 A Network Trojan was detected
TCP 192.168.56.103:49202 -> 195.133.48.136:80 2054350 ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 A Network Trojan was detected
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49195 -> 195.133.13.230:80 2054350 ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 A Network Trojan was detected
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49202 -> 195.133.48.136:80 2054350 ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 A Network Trojan was detected
UDP 192.168.56.103:62576 -> 164.124.101.2:53 2054168 ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49222 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 34.117.59.81:443 -> 192.168.56.103:49222 2025330 ET POLICY External IP Lookup SSL Cert Observed (ipinfo .io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.103:49168 -> 185.215.113.16:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 185.215.113.19:80 -> 192.168.56.103:49228 2400032 ET DROP Spamhaus DROP Listed Traffic Inbound group 33 Misc Attack
TCP 192.168.56.103:49228 -> 185.215.113.19:80 2027250 ET INFO Dotted Quad Host DLL Request Potentially Bad Traffic
TCP 185.215.113.19:80 -> 192.168.56.103:49228 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.19:80 -> 192.168.56.103:49228 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49222
34.117.59.81:443
C=US, O=Let's Encrypt, CN=R11 CN=ipinfo.io 10:03:a0:6b:0a:c8:49:d7:02:69:80:1b:ca:6a:94:20:83:0d:95:91

Snort Alerts

No Snort Alerts