NetWork | ZeroBOX

Network Analysis

IP Address Status Action
185.215.113.41 Active Moloch
185.215.113.59 Active Moloch
193.233.237.109 Active Moloch
Name Response Post-Analysis Lookup
No hosts contacted.
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.41/files/fate/random.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.41/files/7453936223/LAc2heq.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.41/files/6336929412/Hmcm0Oj.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.41/files/5561582465/235T1TS.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.41/files/6691015685/xztOH3r.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.41/files/ebash/random.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.41/files/6629342726/i5Kz53x.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.41/files/7881515133/690BRuM.bat
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.41/files/6350437481/lBiQciH.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.41/files/5308024245/pOqYWAZ.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.41/files/5804781818/eZp5zCz.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 200 http://185.215.113.41/files/7709196889/hvof1h0.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 304 http://185.215.113.41/files/6350437481/lBiQciH.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 304 http://185.215.113.41/files/5561582465/235T1TS.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 304 http://185.215.113.41/files/6629342726/i5Kz53x.exe
REQUEST
RESPONSE
POST 200 http://185.215.113.59/Dy5h4kus/index.php
REQUEST
RESPONSE
GET 304 http://185.215.113.41/files/7881515133/690BRuM.bat
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 185.215.113.59:80 -> 192.168.56.103:49167 2400031 ET DROP Spamhaus DROP Listed Traffic Inbound group 32 Misc Attack
TCP 185.215.113.41:80 -> 192.168.56.103:49172 2400031 ET DROP Spamhaus DROP Listed Traffic Inbound group 32 Misc Attack
TCP 185.215.113.59:80 -> 192.168.56.103:49167 2060969 ET MALWARE Amadey CnC Response Malware Command and Control Activity Detected
TCP 192.168.56.103:49172 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49174 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49168 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49174 2014819 ET INFO Packed Executable Download Misc activity
TCP 192.168.56.103:49176 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49176 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49172 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49176 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49172 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49172 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49176 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49174 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49174 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49174 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49168 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49168 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49168 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49176 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49172 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49183 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49174 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49179 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49189 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49179 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49179 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49179 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49189 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49189 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49189 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49195 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49189 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49189 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49189 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49179 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49183 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49183 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49183 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49195 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.215.113.41:80 -> 192.168.56.103:49195 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49195 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49213 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49213 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49213 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.103:49195 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49195 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.215.113.41:80 -> 192.168.56.103:49195 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49208 -> 193.233.237.109:1912 2043233 ET INFO Microsoft net.tcp Connection Initialization Activity Potentially Bad Traffic
TCP 192.168.56.103:49208 -> 193.233.237.109:1912 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 192.168.56.103:49208 -> 193.233.237.109:1912 2046045 ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) A Network Trojan was detected
TCP 193.233.237.109:1912 -> 192.168.56.103:49208 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response A Network Trojan was detected
TCP 192.168.56.103:49208 -> 193.233.237.109:1912 2043231 ET MALWARE Redline Stealer TCP CnC Activity A Network Trojan was detected
TCP 193.233.237.109:1912 -> 192.168.56.103:49208 2046056 ET MALWARE Redline Stealer/MetaStealer Family Activity (Response) A Network Trojan was detected
TCP 192.168.56.103:49195 -> 185.215.113.41:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts