NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
198.251.72.110 Active Moloch
207.241.228.147 Active Moloch
Name Response Post-Analysis Lookup
ia801407.us.archive.org 207.241.228.147
GET 200 http://www.bing.com/favicon.ico
REQUEST
RESPONSE
GET 200 http://198.251.72.110/ALL.txt
REQUEST
RESPONSE
GET 200 http://198.251.72.110/Server.txt
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49606 -> 207.241.228.147:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 198.251.72.110:80 -> 192.168.56.103:49608 2018856 ET MALWARE Windows executable base64 encoded A Network Trojan was detected
TCP 198.251.72.110:80 -> 192.168.56.103:49608 2029538 ET HUNTING EXE Base64 Encoded potential malware Misc activity

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49606
207.241.228.147:443
C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G2 OU=Domain Control Validated, CN=*.us.archive.org 9c:3c:d6:6d:65:69:f2:95:8c:99:48:e3:e0:7f:14:38:36:4c:ba:d0

Snort Alerts

No Snort Alerts