BeguileSoft - Traffic Analysis Exercise
2019-05-02 MALWARE TRAFFIC ANALYSIS ANSWER WITH EXPLANATION
Note - Drop a comment if you require the pcap file. In order to follow the community guidelines I cannot post the link here.
Executive summary
On 2019-05-02 at 21:36 UTC, a Windows host used by Adriana Breaux was infected with Hawkeye Keylogger.
Event List
Details of infected host
1. IP address- 10.0.0.227
2. Host name- Breaux-Win7-PC
· To determine the hostname, we can filter for DNS and look for the hostname in each of the packets.

- Mac address- 84:8f:69:09:86:c0
Indicator of Compromise
1. 104.16.154.36 Port 80 - whatismyipaddress.com GET /Http/1.1.
2. 145.14.144.10 Port 21 - 000webost.com – FTP control channel
3. 145.14.145.99 Port 21 - 000webost.com – FTP control channel.
Notes:
Inherently none of the IOCs are malicious. We notice an HTTP request to whatismyipaddress. It isn’t necessarily an IOC. In this scenario, the Hawkeye keylogger stores username and passwords to an FTP server hosted through 000webhost.com.
If we use the command command “ftp.request.command eq USER or ftp.request.command eq PASS or ftp.request.command eq STOR” we can see the Hawkeye keylogger in action.
- If we use ftp-data and follow the tcp stream of the first packet we can see the passwords stolen along with the host name and other relevant information.
- We can simply go to file – export objects – FTP data. From there we can download all the files that were downloaded in this packet capture. Below are the jpeg files.
Conclusion
3
4.








Comments
Post a Comment