NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.56.235 Active Moloch
164.124.101.2 Active Moloch
192.187.111.221 Active Moloch
216.250.110.37 Active Moloch
34.102.136.180 Active Moloch
85.13.132.154 Active Moloch
GET 200 https://braxsilcxfxc.net.br/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-7C3003343EF933D95A37D220246552C8.html
REQUEST
RESPONSE
GET 200 https://braxsilcxfxc.net.br/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-9DF487ED829B131DDBA24D56868C7EF2.html
REQUEST
RESPONSE
GET 301 http://braxsilcxfxc.net.br/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-7C3003343EF933D95A37D220246552C8.html
REQUEST
RESPONSE
GET 301 http://braxsilcxfxc.net.br/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-9DF487ED829B131DDBA24D56868C7EF2.html
REQUEST
RESPONSE
GET 301 http://www.studio4culture.net/pbt/?T8SD=/tJKmOzgObyDth2AimgKp1GAfCI75Iy8Hpxd4NC2Qufji5lDtIWEvn7RqfrmzGwFXt00o1/h&-ZPh=1bdtvL
REQUEST
RESPONSE
GET 302 http://www.myhealthyyvet.com/pbt/?T8SD=afMh07a73fMW/orJQhK5qCN6WNvDaJB3IMkHmVCl5ziw6Gpi4lzWx5IEyOJ1IOIrpMcp3ZYj&-ZPh=1bdtvL
REQUEST
RESPONSE
GET 403 http://www.inthemodern.com/pbt/?T8SD=edFuLU10S6R+QUZXHOLs8Ufxq0Mq2FT4YPyuEAx1sMS745R9//G9L19l2loeeFtYauV5DO+k&-ZPh=1bdtvL
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49201 -> 104.21.56.235:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49216 -> 34.102.136.180:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49216 -> 34.102.136.180:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49216 -> 34.102.136.180:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49215 -> 192.187.111.221:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49215 -> 192.187.111.221:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49215 -> 192.187.111.221:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49214 -> 85.13.132.154:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49214 -> 85.13.132.154:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.101:49214 -> 85.13.132.154:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49201
104.21.56.235:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 7c:73:22:c7:d1:20:c3:53:b5:f5:08:fc:2f:c9:56:50:cd:a3:91:2d

Snort Alerts

No Snort Alerts