2022 02 23 TRAFFIC ANALYSIS EXERCISE - 0xd0s/Pcap-Analysis GitHub Wiki
https://www.malware-traffic-analysis.net/2022/02/23/index.html
SCENARIO
LAN segment data:
LAN segment range: 172.16.0.0/24 (172.16.0.0 through 172.16.0.255)
Domain: sunnystation.com
Domain controller: 172.16.0.52 - SUNNYSTATION-DC
File Server: 172.16.0.53 - SUNNYFILESERVER
LAN segment gateway: 172.16.0.1
LAN segment broadcast address: 172.16.0.255
TASK
What hosts/user account names are active on this network?
What type of malware are they infected with?
Hosts/Users
Hosts
IP | Hostname | User | Malware |
---|---|---|---|
172.16.0.131 | DESKTOP-VD151O7 | tricia.becker | xloader |
172.16.0.149 | DESKTOP-KPQ9FDB | nick.montgomery | emotet |
172.16.0.170 | DESKTOP-W5TFTQY | everett.french | emotet |
IOCs
172.16.0.131
- File downloaded: Ocklqc.jpg
- File type: DLL
- Hash: 8e231ce16b3613813371d2c76eef79f3658a2f88
- Flagged as Malicious by VT
- Several get request from malicious domains.
- xloader malware
172.16.0.170
- Connections to malicious domain dalgahavuzu[.]com related to Emotet malware.
172.16.0.149
- Downloaded file from ajaxmatters[.]com
- Filename: zbBYgukXYxzAF2hZc
- Hash: 14b57211308ac8ad2a63c965783d9ba1c2d1930d0cafd884374d143a481f9bf3
- Hash is flagged as malicious on VirusTotal with vendors indicating it is related to Emotet.
Investigation
172.16.0.131
Looking at protocol hierarchy for 172.16.0.131 you can see that HTTP accounts for the highest percentage of bytes.
Digging into HTTP we can see right away that files are being downloaded from 156.96.154[.]210. Let's export the files to check the file type and hash.
As you can see in the below screen shots the file titled as Ocklqc.jpg is flagged as malicious by numerous vendors on VirusTotal.
The Wireshark capture above also shows numerous GET requests. Below are a list of these GET request.
IP | Domain | Get Request |
---|---|---|
23.227.38.74 | www.katchybugonsale.com | /uar3/?OXtd9L=cFNTMFX8k4Sl&WN68=YMSFGVfdS9ONGuAKqerSFa9naGdXyzjeSZBgl3Bk94ai8h1oihtuDN4qXdcs1YMbgxqWO7UijFru1VtwMrj0Yg== |
72.167.191.69 | www.privilegetroissecurity.com | /uar3/?WN68=wVxHuY5BHg7y43vUI54ltScM5FHYr3MvVK9tRiGpEzbIy71wclYGr86TQQDm3pXvN7rNGmSla0zZHvUrNEOd8Q==&OXtd9L=cFNTMFX8k4Sl |
194.9.94.85 | www.hentainftxxx.com | /uar3/?OXtd9L=cFNTMFX8k4Sl&WN68=7GGwHF32hRrdL34DIy4C++DYnMj/1d2v4JDqR5DLy9MEgQIZhCtufLoZXudHqPtA4E9sAhQJ5IzwCvVbNJKdoQ== |
198.54.117.210 | www.moonshot.properties | /uar3/?WN68=G7COZmwnrPee5EsQB6aSZw5LG2UW7KHIFA2umt3z9Jon7OXS6qAVkpOr+xKOV+zPMOEQaf63vM5y0TRfGLX9kw==&OXtd9L=cFNTMFX8k4Sl |
120.55.51.124 | www.nt-renewable.com | /uar3/?OXtd9L=cFNTMFX8k4Sl&WN68=8dr/spia4rwQa9udFLoUWLhDyWB6Y+ownAf/kRXxJwJVGebs5pP6NWs1hg+O5/59UnRkE2LClKUdc3S/D+UP/w== |
216.58.193.147 | www.elsiepupz.com | /uar3/?WN68=8mm7juO0roa0c+eoFXdeNMhxaLq+UOHK2Gb4HZKVJ5c/89uOKLCXn+ltWpT8D6eBozFxFRC8NwSE5MNPGjBvbw==&OXtd9L=cFNTMFX8k4Sl |
198.185.159.144 | www.jogoreviravolta.com | /uar3/?OXtd9L=cFNTMFX8k4Sl&WN68=HgytsQeQm5k0JsiX3+xHTPqNeoAsZVOwel7pX1mp3pbqNYluV8paLXKGPRTm0h2A1X7YRo+hCzAHabyaXGya1Q== |
213.186.33.5 | www.seo-python.com | /uar3/?WN68=ytaVTsUV2lhqQKL61ah7bbHTc8PUfHVAz52PWpuGTKIYDZecH7Q6UUGSzaPenE3Of8SqJWZQwpeASzStGycgxA==&OXtd9L=cFNTMFX8k4Sl |
23.227.38.74 | www.db-propertygroup.com | /uar3/?WN68=wLPqDi6WkwhBj433Ws1QWRAisb43Y4vnWD77yX4A6l/EM3iK/pFUTvPwCnDSQCKQYsapKIpkeyt25I1F4noK8Q==&OXtd9L=cFNTMFX8k4Sl |
154.206.65.249 | www.czzhudi.com | /uar3/?WN68=PHhlvnmfOw59M/FZc+cjVGc9E+FfGp0TERrr3iXeT60uB9RQS+IvYoe8rfvBvY2wGRGtZyZa6OrSqVXvPAs7JA==&OXtd9L=cFNTMFX8k4Sl |
104.21.89.147 | www.hydrocheats.com | /uar3/?OXtd9L=cFNTMFX8k4Sl&WN68=OeYQqIU9fkIjHq0iRTjpk5h8JewsY/FAEEGplD1myE1VivIRdy4CVvbuzuyXb7LJfyhf2G3tozH0TabGGRXNyg== |
66.235.200.112 | www.riskprotek.com | /uar3/?WN68=vaasl1HXy+nS4gMTb8cCc4ZxdXrfp3VJbllccGrazaG48wmyoenn5mm8iv5Y3umlrzKeRVe5owfjDaqVto7ySQ==&rDK=9rxt2VrP0VOLNd |
198.54.117.215 | www.campdiscount.info | /uar3/?rDK=9rxt2VrP0VOLNd&WN68=6RSomoeDKvu2oZGYnGQevtVkDkPAkn8CsZ1fJuCFoaRm9//tAr+u37U/QCD2qVC/dAHjd57BD2t/Oxw5fT4Nlw== |
209.17.116.163 | www.mystore.guide | /uar3/?WN68=AJisDJhbFc3cSa+wvCaKG4qBsq/WHsLY00hpfL+ug958E/QUX/nqsR+NhlSxgpTeQKNoKt6jus0BQP11eAYtlQ==&rDK=9rxt2VrP0VOLNd |
104.16.12.194 | www.theperfecttrainer.com | /uar3/?rDK=9rxt2VrP0VOLNd&WN68=I2l43oNVzWohwc97LSEXaWdVqxBOXBdEroFdfarp+DazR9mP3HsZrHA9P20czBHo7A9Q6BtLZHoFBMxs+Q0aUA== |
216.172.184.77 | www.globalsovereignbank.com | /uar3/?WN68=yYhzgZciQ0pBJ/8G1dSJukDWWYW4SQVbEV+RnWrDBs6A2klS4c6xvZXPWB28QBvYg5FyuTRLTP9+/gPb7Dyx9A==&rDK=9rxt2VrP0VOLNd |
198.185.159.144 | www.jogoreviravolta.com | /uar3/?OXtd9L=cFNTMFX8k4Sl&WN68=HgytsQeQm5k0JsiX3+xHTPqNeoAsZVOwel7pX1mp3pbqNYluV8paLXKGPRTm0h2A1X7YRo+hCzAHabyaXGya1Q== |
23.227.38.74 | www.db-propertygroup.com | /uar3/?WN68=wLPqDi6WkwhBj433Ws1QWRAisb43Y4vnWD77yX4A6l/EM3iK/pFUTvPwCnDSQCKQYsapKIpkeyt25I1F4noK8Q==&OXtd9L=cFNTMFX8k4Sl |
216.58.193.147 | www.xn--pckwb0cye6947ajzku8opzi.com | /uar3/?OXtd9L=cFNTMFX8k4Sl&WN68=zeqtNgG9qaggg50hsBYKfMtRhSgr1QCYqFreEa/f3NyBOVRw9vKCqHY5UvVd0GGKhtkXMCmx/YKDQN95OCuo4g== |
154.206.65.249 | www.czzhudi.com | /uar3/?WN68=PHhlvnmfOw59M/FZc+cjVGc9E+FfGp0TERrr3iXeT60uB9RQS+IvYoe8rfvBvY2wGRGtZyZa6OrSqVXvPAs7JA==&OXtd9L=cFNTMFX8k4Sl |
104.21.89.147 | www.hydrocheats.com | /uar3/?OXtd9L=cFNTMFX8k4Sl&WN68=OeYQqIU9fkIjHq0iRTjpk5h8JewsY/FAEEGplD1myE1VivIRdy4CVvbuzuyXb7LJfyhf2G3tozH0TabGGRXNyg== |
3.130.253.23 | www.keysine.com | /uar3/?Rx=3fqpvFxpqlVpsJr0&WN68=rUb9fjakxYTFD8z67QPd/z9ZU79kig+C682K4H/u+g+BDuvQEiej59oCwTmjTn3VIgEsDrJTMHhelfjdUr/lOQ== |
173.231.37.114 | www.chinadqwx.com | /uar3/?WN68=9m2BuYjy2P5QVnF55yTJRV/9LhiAAt/MT+Kbm8QIT+MHAFzaldcGnNZ3pWSYBbzkonlkIpTVKgvisutZzhPqOw==&Rx=3fqpvFxpqlVpsJr0 |
184.168.99.26 | www.awridahmed.com | /uar3/?WN68=Rxa7roEa5tNLCQbNrgjP26TJ8hY95dmiy0vlywMBfbVg3NfijesNxg9KSG3foxjNI1f6qg1A75MBHEYl1CRNww==&Rx=3fqpvFxpqlVpsJr0 |
66.29.145.216 | www.ban-click.com | /uar3/?OXtd9L=cFNTMFX8k4Sl&WN68=PJmt9gv9iGU9d8hCPuUD9qFGrc2TdJl2olRt+T3RNFHgmOi5kNyM4d9HjU8Ipcbb+g/FLincIuHx0S3I0xIWfw== |
Several of these domains are related to xloader malware family.
Between, the malicious file that was downloaded and these GET request from domains related to xloader malware I think we can reasonably conclude that his host is infected with the xloader malware.
172.16.0.170
Using the protocol hierarchy we can see what protocol is generating the most traffic. In this case it is TLS. There are a large number of TLS connections. To narrow this down farther I looked at the conversations related to the filter ip.addr == 172.16.0.170 && tls. By doing this we can see what endpoints are generating the largest amount of bytes.
While digging into the TLS traffic for 172.16.0.170 I noticed a suspicious domain dalgahavuzu[.]com (178.211.56.194).
Several vendors on VirusTotal have flagged dalgahavuzu[.]com as malicious.
172.16.0.149
A file from ajaxmatters[.]com/c7g8t/ was downloaded to 172.16.0.149. Filename is zbBYgukXYxzAF2hZc and is a DDL with hash 14b57211308ac8ad2a63c965783d9ba1c2d1930d0cafd884374d143a481f9bf3. This hash is flagged as malicious on VirusTotal with vendors indicating it is related to Emotet.