NetWork | ZeroBOX

Network Analysis

IP Address Status Action
144.126.151.240 Active Moloch
164.124.101.2 Active Moloch
208.95.112.1 Active Moloch
74.120.9.25 Active Moloch
GET 200 https://filedn.com/lK8iuOs2ybqy4Dz6sat9kSz/Hasselmus.jpb
REQUEST
RESPONSE
GET 200 https://filedn.com/lK8iuOs2ybqy4Dz6sat9kSz/QblVUbUiHwTSX245.bin
REQUEST
RESPONSE
GET 200 http://ip-api.com/json/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49165 -> 74.120.9.25:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49166 -> 74.120.9.25:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49167 -> 208.95.112.1:80 2036383 ET MALWARE Common RAT Connectivity Check Observed A Network Trojan was detected
TCP 192.168.56.101:49167 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
UDP 192.168.56.101:54148 -> 164.124.101.2:53 2054141 ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) Device Retrieving External IP Address Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49165
74.120.9.25:443
C=LV, L=Riga, O=GoGetSSL, CN=GoGetSSL RSA DV CA CN=filedn.com f1:84:2d:e7:88:e7:61:14:50:8b:a7:c3:5f:e6:88:07:a9:bc:40:f8
TLSv1
192.168.56.101:49166
74.120.9.25:443
C=LV, L=Riga, O=GoGetSSL, CN=GoGetSSL RSA DV CA CN=filedn.com f1:84:2d:e7:88:e7:61:14:50:8b:a7:c3:5f:e6:88:07:a9:bc:40:f8

Snort Alerts

No Snort Alerts