NetWork | ZeroBOX

Network Analysis

IP Address Status Action
142.250.197.106 Active Moloch
164.124.101.2 Active Moloch
172.67.25.94 Active Moloch
GET 200 https://pastebin.com/raw/pzXGkayU
REQUEST
RESPONSE
GET 400 https://firebasestorage.googleapis.com/v0/b/rodriakd-8413d.appspot.com/o/dll/rodadll.txt?alt=media&token=aa0328ac-1aba-4a7b-89a6-42621f5aa921
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49166 -> 172.67.25.94:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49167 -> 142.250.197.106:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49166
172.67.25.94:443
C=US, O=Google Trust Services, CN=WR1 CN=pastebin.com 23:0a:6d:10:e8:e5:69:5e:8b:b3:d5:f7:68:b4:87:dc:57:ae:82:c7
TLSv1
192.168.56.101:49167
142.250.197.106:443
C=US, O=Google Trust Services, CN=WE2 CN=upload.video.google.com 62:3a:f6:bd:3a:0b:ed:3b:16:28:ba:75:d2:00:cf:50:37:6c:20:50

Snort Alerts

No Snort Alerts