NetWork | ZeroBOX

Network Analysis

IP Address Status Action
142.250.197.234 Active Moloch
142.250.199.232 Active Moloch
142.250.76.3 Active Moloch
164.124.101.2 Active Moloch
23.219.19.250 Active Moloch
34.54.88.138 Active Moloch
GET 200 https://www.virustotal.com/ui/users/Arkadij_0/avatar
REQUEST
RESPONSE
GET 200 https://www.googletagmanager.com/gtm.js?id=GTM-KFBGZNL
REQUEST
RESPONSE
GET 200 https://fonts.googleapis.com/icon?family=Material+Icons
REQUEST
RESPONSE
GET 200 https://fonts.googleapis.com/icon?family=Material+Icons
REQUEST
RESPONSE
GET 200 https://fonts.gstatic.com/s/materialicons/v143/flUhRq6tzZclQEJ-Vdg-IuiaDsNa.woff
REQUEST
RESPONSE
GET 200 http://cacerts.digicert.com/DigiCertGlobalRootG2.crt
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49167 -> 142.250.199.232:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49166 -> 142.250.199.232:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49168 -> 34.54.88.138:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49171 -> 142.250.197.234:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 142.250.76.3:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49169 -> 34.54.88.138:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49173 -> 142.250.76.3:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49178 -> 52.239.160.33:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49170 -> 142.250.197.234:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49180 -> 52.239.160.33:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49167
142.250.199.232:443
C=US, O=Google Trust Services, CN=WE2 CN=*.google-analytics.com e4:97:12:2a:2b:30:84:66:33:9d:d6:09:14:d3:8f:ce:3e:20:73:24
TLSv1
192.168.56.103:49166
142.250.199.232:443
C=US, O=Google Trust Services, CN=WE2 CN=*.google-analytics.com e4:97:12:2a:2b:30:84:66:33:9d:d6:09:14:d3:8f:ce:3e:20:73:24
TLSv1
192.168.56.103:49168
34.54.88.138:443
C=US, O=Google Trust Services, CN=WR3 CN=www.virustotal.com a9:93:a3:e6:12:e2:0b:b1:6f:73:f6:8d:fd:d3:0f:1e:ae:d2:ed:8a
TLSv1
192.168.56.103:49171
142.250.197.234:443
C=US, O=Google Trust Services, CN=WE2 CN=upload.video.google.com 7e:14:87:08:df:ba:04:65:17:ba:3b:4f:ba:ea:bc:8c:3f:0a:a4:00
TLSv1
192.168.56.103:49172
142.250.76.3:443
C=US, O=Google Trust Services, CN=WE2 CN=*.gstatic.com 62:27:9c:c9:95:ff:8f:83:34:d0:b1:42:cb:b7:63:c0:8e:6f:3e:f1
TLSv1
192.168.56.103:49169
34.54.88.138:443
C=US, O=Google Trust Services, CN=WR3 CN=www.virustotal.com a9:93:a3:e6:12:e2:0b:b1:6f:73:f6:8d:fd:d3:0f:1e:ae:d2:ed:8a
TLSv1
192.168.56.103:49173
142.250.76.3:443
C=US, O=Google Trust Services, CN=WE2 CN=*.gstatic.com 62:27:9c:c9:95:ff:8f:83:34:d0:b1:42:cb:b7:63:c0:8e:6f:3e:f1
TLSv1
192.168.56.103:49178
52.239.160.33:443
C=US, O=Microsoft Corporation, CN=Microsoft Azure RSA TLS Issuing CA 03 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=*.web.core.windows.net 22:d9:a8:14:ff:86:7a:4b:f0:95:ea:b0:9f:c1:b5:62:6b:b0:62:a9
TLSv1
192.168.56.103:49170
142.250.197.234:443
C=US, O=Google Trust Services, CN=WE2 CN=upload.video.google.com 7e:14:87:08:df:ba:04:65:17:ba:3b:4f:ba:ea:bc:8c:3f:0a:a4:00
TLSv1
192.168.56.103:49180
52.239.160.33:443
C=US, O=Microsoft Corporation, CN=Microsoft Azure RSA TLS Issuing CA 03 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=*.web.core.windows.net 22:d9:a8:14:ff:86:7a:4b:f0:95:ea:b0:9f:c1:b5:62:6b:b0:62:a9

Snort Alerts

No Snort Alerts