NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
81.177.139.41 Active Moloch
Name Response Post-Analysis Lookup
ydq.uhuua.ru 81.177.139.41
faryna.xyz
GET 200 https://ydq.uhuua.ru/SystemNetTransmitFileBuffersZ
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49806 -> 81.177.139.41:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49806
81.177.139.41:443
C=US, O=Let's Encrypt, CN=R3 CN=*.ydq.uhuua.ru b5:13:40:a2:85:ff:12:0c:ea:3b:b1:c3:fb:49:25:b7:f8:10:85:94

Snort Alerts

No Snort Alerts