NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
35.166.81.240 Active Moloch
8.8.7.7 Active Moloch
Name Response Post-Analysis Lookup
No hosts contacted.
GET 200 https://35.166.81.240/waters/travel/new21
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.101 8.8.7.7 8 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 8.8.7.7 8 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 8.8.7.7 8 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 8.8.7.7 8 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 8.8.7.7 8 abcdefghijklmnopqrstuvwabcdefghi
192.168.56.101 8.8.7.7 8 abcdefghijklmnopqrstuvwabcdefghi

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49213 -> 35.166.81.240:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 35.166.81.240:443 -> 192.168.56.101:49213 2023476 ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex) A Network Trojan was detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49213
35.166.81.240:443
C=AT, ST=Bohn, L=Bohn, O=Amadey TM, OU=Amadey Org, CN=amadeamadey.at C=AT, ST=Bohn, L=Bohn, O=Amadey TM, OU=Amadey Org, CN=amadeamadey.at db:43:d0:55:5c:42:2f:4a:67:c8:eb:0d:da:a9:e7:13:22:8f:d9:28

Snort Alerts

No Snort Alerts