Malware Traffic Analysis
@malware_traffic blog has a lot of knowledge so I highly recommend to bookmark it somewhere. The real treasure is of course the amazing exercises page. Depending on the exercise, you get a pcap and other files. The pcap file is a traffic capture which we can analyse in Wireshark and find out where things went wrong!
Being able to effectively analyse traffic is a very important skill for the security of any organisation. It helps the security team to find out where the problem happened and how to mitigate it. It is also super fun!
## Timbershade
Today, I’ll do one of the recent exercises "2019-01-28 - TRAFFIC ANALYSIS EXERCISE - TIMBERSHADE". This time we got two files: a pcap and a text file with Windows security alerts.
QUESTIONS:
• What is the IP address of the infected Windows host?
• What is the MAC address of the infected Windows host?
• What is the host name of the infected Windows host?
• What is the Windows user account name for the infected Windows host?
• What is the SHA256 file hash of the Windows executable file sent to the infected Windows host?
• Based on the IDS alerts, what type of infection is this?
## My Answers
- What is the IP address of the infected Windows host?
The IP of the infected Windows host is 172.17.8.109
- What is the MAC address of the infected Windows host?
- What is the host name of the infected Windows host?
I’ll answer both questions together because we can find the hostname and the MAC address quickly through different ways:
https://unit42.paloaltonetworks.com/using-wireshark-identifying-hosts-and-users/
In this case, we filter by “bootp” > Go to Bootstrap Protocol and then in the options we find the hostname and MAC address:
- What is the Windows user account name for the infected Windows host?
To find this information we can look at the Kerberos traffic. To do that, filter the traffic by “kerberos.CNameString” select one of the frame with the source being our infected Windows host, navigate the frame details sections:
This will add the CNameString to all the Kerberos request so we can find one of them with the username and not the hostname. CNameString values for hostnames always end with a $ (dollar sign), while user account names do not.
The username is “margaret.dunn”.
- What is the SHA256 file hash of the Windows executable file sent to the infected Windows host?
We can find the executable file in: File > Export objects > HTTP. I downloaded the .bin file and in my terminal, I checked its sha256:
9f6e3e65aedca997c6445329663bd1d279392a34cfda7d1b56461eb41641fa08 actiV.bin
- Based on the IDS alerts, what type of infection is this?
Looking at the text file with all the alerts, we easily find several lines showing:
192.241.220.183 -> 172.17.8.109
IPVer=4 hlen=5 tos=0 dlen=1045 ID=0 flags=0 offset=0 ttl=0 chksum=25788
Protocol: 6 sport=3389 -> dport=49214
We can easily conclude that it was a Trojan.Dridex infection which is a banking trojan and spyware trageting Windows systems. You can read more about it in this article.
That’s all for today! Go try some of his exercices and contact me on twitter if you need help!