NetWork | ZeroBOX

Network Analysis

IP Address Status Action
185.39.17.70 Active Moloch
Name Response Post-Analysis Lookup
No hosts contacted.
GET 200 http://185.39.17.70/zgrnf/qxm.exe
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49161 -> 185.39.17.70:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49161 -> 185.39.17.70:80 2019714 ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile Potentially Bad Traffic
TCP 185.39.17.70:80 -> 192.168.56.101:49161 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.39.17.70:80 -> 192.168.56.101:49161 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 185.39.17.70:80 -> 192.168.56.101:49161 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49175
185.39.17.70:8848
CN=Loader Panel/OU=qwqdanchun/O=DcRat By qwqdanchun/L=SH/C=CN CN=DcRat f2:e0:98:9e:bb:cd:c4:d0:ca:9c:0c:80:88:dc:76:a5:95:a0:34:d9

Snort Alerts

No Snort Alerts