Network Analysis
IP Address | Status | Action |
---|---|---|
1.92.90.232 | Active | Moloch |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
- TCP Requests
No traffic
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49161 -> 1.92.90.232:8000 | 2013214 | ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49161 -> 1.92.90.232:8000 | 2016922 | ET MALWARE Backdoor family PCRat/Gh0st CnC traffic | Malware Command and Control Activity Detected |
TCP 192.168.56.103:49161 -> 1.92.90.232:8000 | 2021716 | ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 | Malware Command and Control Activity Detected |
TCP 1.92.90.232:8000 -> 192.168.56.103:49161 | 2048478 | ET MALWARE [ANY.RUN] Win32/Gh0stRat Keep-Alive | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts