NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.67.188.99 Active Moloch
172.67.211.92 Active Moloch
HEAD 200 https://carriagesun.xyz/pe/start/index.php?a=2910&p=4134&t=50784292
REQUEST
RESPONSE
GET 200 https://carriagesun.xyz/pe/start/index.php?a=2910&p=4134&t=50784292
REQUEST
RESPONSE
GET 200 https://marketweek.xyz/endroipe?tid=50784292&pid=4134&a=2910&cc=KR&t=1728008627
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49176 -> 172.67.211.92:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49164 -> 172.67.188.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49176
172.67.211.92:443
C=US, O=Google Trust Services, CN=WE1 CN=marketweek.xyz 30:7f:b7:8c:f9:69:12:0f:96:f2:5e:4e:bd:40:11:2d:ee:25:0c:c5
TLSv1
192.168.56.103:49164
172.67.188.99:443
C=US, O=Google Trust Services, CN=WE1 CN=carriagesun.xyz 0c:53:11:1c:34:df:ab:25:76:d8:db:8d:49:a0:c3:d9:61:87:88:c6

Snort Alerts

No Snort Alerts