NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.192.140.26 Active Moloch
104.237.62.213 Active Moloch
104.26.4.15 Active Moloch
104.26.9.59 Active Moloch
108.61.198.52 Active Moloch
147.45.44.104 Active Moloch
147.45.45.69 Active Moloch
164.124.101.2 Active Moloch
176.111.174.109 Active Moloch
176.113.115.33 Active Moloch
185.215.113.37 Active Moloch
194.116.215.195 Active Moloch
34.117.59.81 Active Moloch
45.91.200.135 Active Moloch
80.66.75.114 Active Moloch
GET 200 https://db-ip.com/demo/home.php?s=
REQUEST
RESPONSE
GET 200 https://api.myip.com/
REQUEST
RESPONSE
GET 200 http://45.91.200.135/api/wp-ping.php
REQUEST
RESPONSE
POST 200 http://45.91.200.135/api/wp-admin.php
REQUEST
RESPONSE
POST 200 http://45.91.200.135/api/wp-admin.php
REQUEST
RESPONSE
HEAD 200 http://194.116.215.195/File.exe
REQUEST
RESPONSE
HEAD 200 http://80.66.75.114/dl?name=inte
REQUEST
RESPONSE
HEAD 200 http://147.45.45.69/sdsdhggf.exe
REQUEST
RESPONSE
HEAD 200 http://147.45.45.69/vdcsb.exe
REQUEST
RESPONSE
HEAD 200 http://147.45.44.104/revada/66f3128883969_crypted.exe#1
REQUEST
RESPONSE
HEAD 200 http://176.113.115.33/thebig/noode.exe
REQUEST
RESPONSE
HEAD 200 http://147.45.44.104/yuop/66f32080436ad_deepweb.exe#deep
REQUEST
RESPONSE
HEAD 200 http://176.111.174.109/kurwa
REQUEST
RESPONSE
HEAD 200 http://185.215.113.37/vera/nate.exe
REQUEST
RESPONSE
GET 200 http://176.111.174.109/kurwa
REQUEST
RESPONSE
GET 200 http://176.113.115.33/thebig/noode.exe
REQUEST
RESPONSE
GET 200 http://185.215.113.37/vera/nate.exe
REQUEST
RESPONSE
GET 200 http://147.45.45.69/sdsdhggf.exe
REQUEST
RESPONSE
GET 200 http://147.45.45.69/vdcsb.exe
REQUEST
RESPONSE
HEAD 200 http://147.45.44.104/malesa/66f31d151f82e_lyla34.exe
REQUEST
RESPONSE
HEAD 200 http://147.45.44.104/lopsa/66f18e5598f87_kaloa.exe
REQUEST
RESPONSE
GET 200 http://194.116.215.195/File.exe
REQUEST
RESPONSE
GET 200 http://80.66.75.114/dl?name=inte
REQUEST
RESPONSE
HEAD 200 http://147.45.44.104/lopsa/66ea645129e6a_jacobs.exe
REQUEST
RESPONSE
GET 200 http://147.45.44.104/yuop/66f32080436ad_deepweb.exe#deep
REQUEST
RESPONSE
HEAD 404 http://240922164748184.tyr.zont16.com/f/fikbam0922184.exe
REQUEST
RESPONSE
GET 200 http://147.45.44.104/revada/66f3128883969_crypted.exe#1
REQUEST
RESPONSE
GET 404 http://240922164748184.tyr.zont16.com/f/fikbam0922184.exe
REQUEST
RESPONSE
GET 200 http://147.45.44.104/malesa/66f31d151f82e_lyla34.exe
REQUEST
RESPONSE
HEAD 200 http://147.45.45.69/vdcsnjdh15.exe
REQUEST
RESPONSE
GET 200 http://147.45.45.69/vdcsnjdh15.exe
REQUEST
RESPONSE
GET 200 http://147.45.44.104/lopsa/66f18e5598f87_kaloa.exe
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49169 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49167 -> 104.237.62.213:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.103:49169 -> 34.117.59.81:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49167 -> 104.237.62.213:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 104.237.62.213:443 -> 192.168.56.103:49168 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49169 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49167 -> 104.237.62.213:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
UDP 192.168.56.103:50800 -> 164.124.101.2:53 2054168 ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49176 -> 147.45.45.69:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49179 -> 176.113.115.33:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
UDP 192.168.56.103:52760 -> 164.124.101.2:53 2047702 ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup Misc activity
TCP 192.168.56.103:49177 -> 147.45.45.69:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49174 -> 194.116.215.195:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49174 -> 194.116.215.195:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 192.168.56.103:49171 -> 104.26.4.15:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 104.26.9.59:443 2042969 ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49172 -> 104.26.9.59:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49176 -> 147.45.45.69:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.37:80 -> 192.168.56.103:49182 2400031 ET DROP Spamhaus DROP Listed Traffic Inbound group 32 Misc Attack
TCP 192.168.56.103:49183 -> 104.192.140.26:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49187 -> 104.192.140.26:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 104.192.140.26:80 -> 192.168.56.103:49183 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49174 -> 194.116.215.195:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49179 -> 176.113.115.33:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49174 -> 194.116.215.195:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 185.215.113.37:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 147.45.44.104:80 -> 192.168.56.103:49178 2400022 ET DROP Spamhaus DROP Listed Traffic Inbound group 23 Misc Attack
TCP 192.168.56.103:49177 -> 147.45.45.69:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49182 -> 185.215.113.37:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.37:80 -> 192.168.56.103:49182 2014819 ET INFO Packed Executable Download Misc activity
TCP 194.116.215.195:80 -> 192.168.56.103:49174 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 194.116.215.195:80 -> 192.168.56.103:49174 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 104.192.140.26:80 -> 192.168.56.103:49185 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 147.45.45.69:80 -> 192.168.56.103:49176 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.37:80 -> 192.168.56.103:49182 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 147.45.45.69:80 -> 192.168.56.103:49176 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.215.113.37:80 -> 192.168.56.103:49182 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 176.111.174.109:80 -> 192.168.56.103:49181 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 176.111.174.109:80 -> 192.168.56.103:49181 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 176.111.174.109:80 -> 192.168.56.103:49181 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 80.66.75.114:80 -> 192.168.56.103:49175 2400007 ET DROP Spamhaus DROP Listed Traffic Inbound group 8 Misc Attack
TCP 192.168.56.103:49184 -> 104.192.140.26:80 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 176.113.115.33:80 -> 192.168.56.103:49179 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 176.113.115.33:80 -> 192.168.56.103:49179 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 176.113.115.33:80 -> 192.168.56.103:49179 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 104.192.140.26:80 -> 192.168.56.103:49184 2260000 SURICATA Applayer Mismatch protocol both directions Generic Protocol Command Decode
TCP 192.168.56.103:49180 -> 147.45.44.104:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 80.66.75.114:80 -> 192.168.56.103:49175 2014819 ET INFO Packed Executable Download Misc activity
TCP 192.168.56.103:49180 -> 147.45.44.104:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49189 -> 104.192.140.26:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 80.66.75.114:80 -> 192.168.56.103:49175 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 80.66.75.114:80 -> 192.168.56.103:49175 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 80.66.75.114:80 -> 192.168.56.103:49175 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 192.168.56.103:49178 -> 147.45.44.104:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 147.45.44.104:80 -> 192.168.56.103:49178 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 147.45.44.104:80 -> 192.168.56.103:49178 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 147.45.44.104:80 -> 192.168.56.103:49180 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 147.45.44.104:80 -> 192.168.56.103:49180 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 147.45.45.69:80 -> 192.168.56.103:49177 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 147.45.45.69:80 -> 192.168.56.103:49177 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49178 -> 147.45.44.104:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 147.45.44.104:80 -> 192.168.56.103:49178 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49176 -> 147.45.45.69:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49180 -> 147.45.44.104:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 147.45.44.104:80 -> 192.168.56.103:49180 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49177 -> 147.45.45.69:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 147.45.45.69:80 -> 192.168.56.103:49177 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 104.237.62.213:443 2047703 ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI Misc activity
TCP 192.168.56.103:49169 -> 34.117.59.81:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49171
104.26.4.15:443
C=US, O=Google Trust Services, CN=WR1 CN=db-ip.com e0:87:2e:81:a3:0e:fe:55:82:41:57:b8:ff:b2:84:42:af:47:01:7c
TLSv1
192.168.56.103:49172
104.26.9.59:443
C=US, O=Google Trust Services, CN=WR1 CN=myip.com b3:80:cf:15:df:f5:53:6f:d4:e4:88:68:de:87:c0:e1:f8:3b:2c:02

Snort Alerts

No Snort Alerts