NetWork | ZeroBOX

Network Analysis

IP Address Status Action
176.113.115.6 Active Moloch
176.113.115.7 Active Moloch
Name Response Post-Analysis Lookup
No hosts contacted.
GET 200 http://176.113.115.7/mine/random.exe
REQUEST
RESPONSE
POST 200 http://176.113.115.6/Ni9kiput/index.php
REQUEST
RESPONSE
POST 200 http://176.113.115.6/Ni9kiput/index.php
REQUEST
RESPONSE
GET 200 http://176.113.115.7/files/7033027882/ZqkKpwG.exe
REQUEST
RESPONSE
POST 200 http://176.113.115.6/Ni9kiput/index.php
REQUEST
RESPONSE
GET 200 http://176.113.115.7/files/5163778194/zx4PJh6.exe
REQUEST
RESPONSE
POST 200 http://176.113.115.6/Ni9kiput/index.php
REQUEST
RESPONSE
GET 200 http://176.113.115.7/files/7684569444/advnrNo.exe
REQUEST
RESPONSE
POST 200 http://176.113.115.6/Ni9kiput/index.php
REQUEST
RESPONSE
POST 200 http://176.113.115.6/Ni9kiput/index.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49167 -> 176.113.115.7:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 176.113.115.7:80 -> 192.168.56.101:49167 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 176.113.115.7:80 -> 192.168.56.101:49167 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 176.113.115.7:80 -> 192.168.56.101:49167 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49178 -> 176.113.115.7:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 176.113.115.7:80 -> 192.168.56.101:49178 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 176.113.115.7:80 -> 192.168.56.101:49178 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 176.113.115.7:80 -> 192.168.56.101:49178 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49173 -> 176.113.115.7:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 176.113.115.7:80 -> 192.168.56.101:49173 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 176.113.115.7:80 -> 192.168.56.101:49173 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 176.113.115.7:80 -> 192.168.56.101:49173 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.101:49173 -> 176.113.115.7:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts