NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.73.122 Active Moloch
117.18.232.200 Active Moloch
164.124.101.2 Active Moloch
Name Response Post-Analysis Lookup
akmalreload.com 172.67.190.5
OPTIONS 200 https://akmalreload.com/struk/
REQUEST
RESPONSE
HEAD 200 https://akmalreload.com/struk/wellcome.html
REQUEST
RESPONSE
OPTIONS 200 https://akmalreload.com/
REQUEST
RESPONSE
GET 200 https://akmalreload.com/struk/wellcome.html
REQUEST
RESPONSE
HEAD 200 https://akmalreload.com/struk/wellcome.html
REQUEST
RESPONSE
HEAD 200 https://akmalreload.com/struk/wellcome.html
REQUEST
RESPONSE
OPTIONS 0 https://akmalreload.com/struk/
REQUEST
RESPONSE
HEAD 200 https://akmalreload.com/struk/wellcome.html
REQUEST
RESPONSE
GET 304 https://akmalreload.com/struk/wellcome.html
REQUEST
RESPONSE
HEAD 200 https://akmalreload.com/struk/wellcome.html
REQUEST
RESPONSE
HEAD 200 https://akmalreload.com/struk/wellcome.html
REQUEST
RESPONSE
GET 200 http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49167 -> 104.21.73.122:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49163 -> 104.21.73.122:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49164 -> 104.21.73.122:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 117.18.232.200:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49166 -> 104.21.73.122:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49174 -> 117.18.232.200:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 117.18.232.200:443 -> 192.168.56.103:49182 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49175 -> 117.18.232.200:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 117.18.232.200:443 -> 192.168.56.103:49176 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49173 -> 117.18.232.200:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49181 -> 117.18.232.200:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 117.18.232.200:443 -> 192.168.56.103:49177 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49180 -> 117.18.232.200:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49167
104.21.73.122:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a3:24:33:73:ac:39:45:2e:aa:54:cb:fe:cc:d2:87:8a:b0:7a:7c:20
TLSv1
192.168.56.103:49163
104.21.73.122:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a3:24:33:73:ac:39:45:2e:aa:54:cb:fe:cc:d2:87:8a:b0:7a:7c:20
TLSv1
192.168.56.103:49164
104.21.73.122:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a3:24:33:73:ac:39:45:2e:aa:54:cb:fe:cc:d2:87:8a:b0:7a:7c:20
TLSv1
192.168.56.103:49166
104.21.73.122:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a3:24:33:73:ac:39:45:2e:aa:54:cb:fe:cc:d2:87:8a:b0:7a:7c:20

Snort Alerts

No Snort Alerts