NetWork | ZeroBOX

Network Analysis

IP Address Status Action
185.196.220.62 Active Moloch
Name Response Post-Analysis Lookup
No hosts contacted.

No traffic

ICMP traffic

Source Destination ICMP Type Data
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3
192.168.56.103 185.196.220.62 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49168 -> 185.196.220.62:24464 2046187 ET MALWARE [ANY.RUN] Win32/DynamicRAT CnC Activity Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts