Alert Table for 2016-03-30-traffic-analysis-exercise.pcap

Relative Time Packet Source Source Port Destination Dest Port Category Rule Set Signature Severity
0.0 n/a 68.177.32.107 80 10.21.101.121 49587 Possible Social Engineering Attempted ET WEB_CLIENT Fake Virus Phone Scam Audio Oct 30 2
0.0 n/a 68.177.32.107 80 10.21.101.121 49587 Possible Social Engineering Attempted ET WEB_CLIENT Tech Support Phone Scam Landing (msg.mp3) 2016-08-12 2
0.0 n/a 185.49.70.57 80 10.21.101.121 49584 Potentially Bad Traffic ET WEB_CLIENT Obfuscated Javascript // ptth 2
0.0 n/a 107.22.230.34 80 10.21.101.121 49396 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
131.0 7320 23.217.102.15 80 10.21.101.121 49332 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
140.0 7898 10.21.101.121 49441 198.154.248.183 80 Generic Protocol Command Decode SURICATA HTTP Request abnormal Content-Encoding header 3
140.0 8086 198.154.248.183 80 10.21.101.121 49441 Exploit Kit Activity Detected ET EXPLOIT_KIT EITest Evil Redirect Leading to EK Feb 01 2016 1
146.0 9216 10.21.101.121 50003 8.8.8.8 53 Potentially Bad Traffic ET DNS Query to a .tk domain - Likely Hostile 2
146.0 9747 10.21.101.121 49501 85.93.0.34 80 Potentially Bad Traffic ET POLICY HTTP Request to a *.tk domain 2
147.0 9915 10.21.101.121 49502 85.93.0.34 80 Potentially Bad Traffic ET POLICY HTTP Request to a *.tk domain 2
152.0 10221 10.21.101.121 49511 185.46.11.245 80 Potential Corporate Privacy Violation ET POLICY Outdated Flash Version M1 1
167.0 11437 184.28.188.193 80 10.21.101.121 49387 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
167.0 11442 2.21.30.22 80 10.21.101.121 49378 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
167.0 11444 184.28.188.195 80 10.21.101.121 49317 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
167.0 11457 173.241.250.143 80 10.21.101.121 49402 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
167.0 11461 184.28.188.184 80 10.21.101.121 49298 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
167.0 11474 184.28.188.187 80 10.21.101.121 49277 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
167.0 11478 184.28.188.194 80 10.21.101.121 49280 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
167.0 11482 184.28.188.216 80 10.21.101.121 49279 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
167.0 11573 72.165.185.9 80 10.21.101.121 49290 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
167.0 11615 72.246.56.130 80 10.21.101.121 49352 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
167.0 11631 72.246.56.57 80 10.21.101.121 49286 Generic Protocol Command Decode SURICATA HTTP unable to match response to request 3
171.0 11770 10.21.101.121 49517 23.211.235.162 80 A Network Trojan was detected ET MALWARE Bedep Connectivity Check M2 1
172.0 11865 10.21.101.121 49518 82.141.230.141 80 Malware Command and Control Activity Detected ET MALWARE Bedep HTTP POST CnC Beacon 1
173.0 11897 10.21.101.121 49519 104.193.252.245 80 Malware Command and Control Activity Detected ET MALWARE Bedep HTTP POST CnC Beacon 1
233.0 12006 10.21.101.121 49520 198.154.248.183 80 Generic Protocol Command Decode SURICATA HTTP Request abnormal Content-Encoding header 3
321.0 12327 10.21.101.121 49534 104.193.252.245 80 Malware Command and Control Activity Detected ET MALWARE Bedep HTTP POST CnC Beacon 1
325.0 14195 10.21.101.121 49534 104.193.252.245 80 Malware Command and Control Activity Detected ET MALWARE Bedep HTTP POST CnC Beacon 1
325.0 14206 10.21.101.121 49535 104.193.252.245 80 Malware Command and Control Activity Detected ET MALWARE Bedep HTTP POST CnC Beacon 1
358.0 14235 10.21.101.121 49538 103.234.36.148 80 Potentially Bad Traffic ET INFO Executable Download from dotted-quad Host 2
359.0 14278 103.234.36.148 80 10.21.101.121 49538 Potential Corporate Privacy Violation ET POLICY PE EXE or DLL Windows file download HTTP 1
359.0 14278 103.234.36.148 80 10.21.101.121 49538 Potentially Bad Traffic ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response 2
408.0 14788 10.21.101.121 49733 8.8.8.8 53 Potentially Bad Traffic ET DNS Query to a *.pw domain - Likely Hostile 2
408.0 14877 10.21.101.121 61565 8.8.8.8 53 Potentially Bad Traffic ET DNS Query to a *.pw domain - Likely Hostile 2
409.0 14915 10.21.101.121 49571 143.95.32.93 80 Misc activity ET INFO HTTP Request to a *.pw domain 3
409.0 14956 10.21.101.121 49580 52.8.93.242 80 Misc activity ET INFO HTTP Request to a *.pw domain 3
409.0 14968 10.21.101.121 49583 52.8.93.242 80 Misc activity ET INFO HTTP Request to a *.pw domain 3
409.0 15007 10.21.101.121 58524 8.8.8.8 53 Potentially Bad Traffic ET DNS Query to a *.pw domain - Likely Hostile 2
409.0 15064 10.21.101.121 49592 67.222.29.202 80 Misc activity ET INFO HTTP Request to a *.pw domain 3
409.0 15079 10.21.101.121 49594 67.222.29.202 80 Misc activity ET INFO HTTP Request to a *.pw domain 3
409.0 15093 10.21.101.121 49593 67.222.29.202 80 Misc activity ET INFO HTTP Request to a *.pw domain 3
Open in new window Done