NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
23.40.44.135 Active Moloch
GET 200 https://s.go-mpulse.net/boomerang/XZ4AH-ABKPW-SQPBC-CYWES-BCG6V
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49167 -> 23.40.44.135:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49172 -> 52.239.160.33:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49171 -> 52.239.160.33:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49166 -> 23.40.44.135:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49167
23.40.44.135:443
C=US, O=DigiCert Inc, CN=DigiCert TLS RSA SHA256 2020 CA1 C=US, ST=Massachusetts, L=Cambridge, O=Akamai Technologies Inc., CN=akstat.io 62:b3:e1:7d:31:f2:31:0f:51:bf:c6:da:bd:5b:41:35:1f:71:f0:30
TLSv1
192.168.56.101:49172
52.239.160.33:443
C=US, O=Microsoft Corporation, CN=Microsoft Azure RSA TLS Issuing CA 03 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=*.web.core.windows.net b2:4f:3d:bf:b7:4e:09:4d:12:54:6c:82:6e:50:6d:72:8f:49:b1:1a
TLSv1
192.168.56.101:49171
52.239.160.33:443
C=US, O=Microsoft Corporation, CN=Microsoft Azure RSA TLS Issuing CA 03 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=*.web.core.windows.net b2:4f:3d:bf:b7:4e:09:4d:12:54:6c:82:6e:50:6d:72:8f:49:b1:1a
TLSv1
192.168.56.101:49166
23.40.44.135:443
C=US, O=DigiCert Inc, CN=DigiCert TLS RSA SHA256 2020 CA1 C=US, ST=Massachusetts, L=Cambridge, O=Akamai Technologies Inc., CN=akstat.io 62:b3:e1:7d:31:f2:31:0f:51:bf:c6:da:bd:5b:41:35:1f:71:f0:30

Snort Alerts

No Snort Alerts