NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.16.230.132 Active Moloch
164.124.101.2 Active Moloch
GET 200 https://hot-browser-luke-granted.trycloudflare.com/mine.exe
REQUEST
RESPONSE
OPTIONS 200 http://hot-browser-luke-granted.trycloudflare.com/
REQUEST
RESPONSE
OPTIONS 200 http://hot-browser-luke-granted.trycloudflare.com/
REQUEST
RESPONSE
PROPFIND 207 http://hot-browser-luke-granted.trycloudflare.com/
REQUEST
RESPONSE
PROPFIND 207 http://hot-browser-luke-granted.trycloudflare.com/
REQUEST
RESPONSE
PROPFIND 207 http://hot-browser-luke-granted.trycloudflare.com/rename.lnk
REQUEST
RESPONSE
PROPFIND 207 http://hot-browser-luke-granted.trycloudflare.com/rename.lnk
REQUEST
RESPONSE
GET 200 http://hot-browser-luke-granted.trycloudflare.com/rename.lnk
REQUEST
RESPONSE
PROPFIND 207 http://hot-browser-luke-granted.trycloudflare.com/desktop.ini
REQUEST
RESPONSE
GET 200 http://hot-browser-luke-granted.trycloudflare.com/desktop.ini
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49182 -> 104.16.230.132:443 2058175 ET HUNTING TryCloudFlare Domain in TLS SNI Misc activity
TCP 192.168.56.101:49182 -> 104.16.230.132:443 2060250 ET INFO Observed trycloudflare .com Domain in TLS SNI Misc activity
TCP 192.168.56.101:49182 -> 104.16.230.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.101:59002 -> 164.124.101.2:53 2034552 ET POLICY Observed DNS Query to Commonly Abused Cloudflare Domain (trycloudflare .com) Potentially Bad Traffic
TCP 192.168.56.101:49181 -> 104.16.230.132:443 2058175 ET HUNTING TryCloudFlare Domain in TLS SNI Misc activity
TCP 192.168.56.101:49181 -> 104.16.230.132:443 2060250 ET INFO Observed trycloudflare .com Domain in TLS SNI Misc activity
TCP 192.168.56.101:49181 -> 104.16.230.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 104.16.230.132:80 -> 192.168.56.101:49164 2049438 ET HUNTING Successful PROPFIND Response for Application Media Type Misc activity
TCP 104.16.230.132:80 -> 192.168.56.101:49164 2049438 ET HUNTING Successful PROPFIND Response for Application Media Type Misc activity
TCP 104.16.230.132:80 -> 192.168.56.101:49164 2048508 ET INFO LNK File Downloaded via HTTP Misc activity
TCP 104.16.230.132:80 -> 192.168.56.101:49164 2049438 ET HUNTING Successful PROPFIND Response for Application Media Type Misc activity

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49182
104.16.230.132:443
C=US, O=Google Trust Services, CN=WR1 CN=trycloudflare.com c1:f5:d9:f4:2e:e4:62:4a:93:1f:06:f7:a0:22:d4:38:59:bf:bd:94
TLSv1
192.168.56.101:49181
104.16.230.132:443
C=US, O=Google Trust Services, CN=WR1 CN=trycloudflare.com c1:f5:d9:f4:2e:e4:62:4a:93:1f:06:f7:a0:22:d4:38:59:bf:bd:94
TLSv1
192.168.56.101:49175
104.16.230.132:443
C=US, O=Google Trust Services, CN=WR1 CN=trycloudflare.com c1:f5:d9:f4:2e:e4:62:4a:93:1f:06:f7:a0:22:d4:38:59:bf:bd:94

Snort Alerts

No Snort Alerts