NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.67.214.157 Active Moloch
Name Response Post-Analysis Lookup
pkimet.al 104.21.53.154
POST 200 https://pkimet.al/lintcert
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49166 -> 172.67.214.157:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49165 -> 172.67.214.157:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49168 -> 52.239.160.33:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49169 -> 52.239.160.33:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49166
172.67.214.157:443
C=US, O=Google Trust Services, CN=WE1 CN=pkimet.al fc:66:da:94:62:4b:40:18:d4:8c:e7:07:c6:1b:82:91:ca:42:4d:a5
TLSv1
192.168.56.101:49165
172.67.214.157:443
C=US, O=Google Trust Services, CN=WE1 CN=pkimet.al fc:66:da:94:62:4b:40:18:d4:8c:e7:07:c6:1b:82:91:ca:42:4d:a5
TLSv1
192.168.56.101:49168
52.239.160.33:443
C=US, O=Microsoft Corporation, CN=Microsoft Azure RSA TLS Issuing CA 03 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=*.web.core.windows.net b2:4f:3d:bf:b7:4e:09:4d:12:54:6c:82:6e:50:6d:72:8f:49:b1:1a
TLSv1
192.168.56.101:49169
52.239.160.33:443
C=US, O=Microsoft Corporation, CN=Microsoft Azure RSA TLS Issuing CA 03 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=*.web.core.windows.net b2:4f:3d:bf:b7:4e:09:4d:12:54:6c:82:6e:50:6d:72:8f:49:b1:1a

Snort Alerts

No Snort Alerts