Network Analysis
IP Address | Status | Action |
---|---|---|
103.106.0.20 | Active | Moloch |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
No traffic
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49165 -> 103.106.0.20:57540 | 2033713 | ET MALWARE Cobalt Strike Beacon Observed | Targeted Malicious Activity was Detected |
TCP 192.168.56.101:49164 -> 103.106.0.20:57540 | 2033713 | ET MALWARE Cobalt Strike Beacon Observed | Targeted Malicious Activity was Detected |
TCP 103.106.0.20:57540 -> 192.168.56.101:49163 | 2035442 | ET MALWARE Successful Cobalt Strike Shellcode Download (x64) M1 | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts