NetWork | ZeroBOX

Network Analysis

IP Address Status Action
154.212.217.131 Active Moloch
164.124.101.2 Active Moloch
45.83.122.3 Active Moloch
91.238.203.54 Active Moloch
GET 404 http://www.3829752.cfd/bopi/?UTdDKJW=1n/mJy6ksDjD1SFo6tgU/Wr3viufzKz1zGPKoIZ/eT2C0XRqhpMPr268WDPCq90ugD8pXNLi&mL08lN=WZOxq0HpO2iTW
REQUEST
RESPONSE
GET 301 http://www.destekbirimi.xyz/bopi/?UTdDKJW=9OIArt/8XXMuOuiAXmWQOXk3C62UqizBLfIIJUoXr9mFGY36FaazwV+NPSHlUIcw8LgUWBtQ&mL08lN=WZOxq0HpO2iTW
REQUEST
RESPONSE
GET 404 http://www.qe2i7cghzpebk.buzz/bopi/?UTdDKJW=RLa7ILqG4DqD2QWAJ5sdOLYMTU4dZMJmeqDFyse7ghEGCiaotSRU8zg4aIvjGBOLKNss/XyU&mL08lN=WZOxq0HpO2iTW
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49168 -> 154.212.217.131:80 2032991 ET INFO HTTP Request to a *.buzz domain Potentially Bad Traffic
TCP 192.168.56.101:49168 -> 154.212.217.131:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49168 -> 154.212.217.131:80 2032991 ET INFO HTTP Request to a *.buzz domain Potentially Bad Traffic
TCP 192.168.56.101:49167 -> 45.83.122.3:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49167 -> 45.83.122.3:80 2031088 ET HUNTING Request to .XYZ Domain with Minimal Headers Potentially Bad Traffic
TCP 192.168.56.101:49166 -> 91.238.203.54:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts