SteelCoffee - Traffic Analysis Exercise
Scenario:
Alerts:
- 10.0.0.167 – GRIONXA – elmer obrian
- 10.0.0149 – C10SKPY – alyssa fitzgerald.
- The windows client 10.0.0.167 was affected by the malware. We can determine this by looking at the alerts since the 10.0.0167 is engaging with the malware in the 4th alert.
- Qakbot or Qbot.
Notes:
According to the alerts file present above we see a number of alerts but it is important to note that only one of them is important to us. That is thr 4th alert of “ET Malware windows alert send….”
The alert shows the trigger was from 119.31.234.40 port 80 and going to 10.0.0.167 port 51132. It shows that a windows executable is sent while the host says its an image file.
If we filter for the above traffic with port 51132 and follow the traffic for tcp stream we see the content type to be an image but just below it the stream shows “MZ”. The “MZ” at the beginning of the signature indicates that the file is a PE executable.
Now our next step is to locate this image file, export it to our kali linux and check the SHA256. By going to file -> export objects -> http -> alphapioneer.com we can save the png file. The reason for choosing alphapioneer is that the above screenshot shows the host as alphapioneer.com.
Next we want to check the sha 256 of this file. I am using kali linux hence I open my terminal and se the command shasum -a 256 file.name. The sha256 value is shown below.






Comments
Post a Comment