0% found this document useful (0 votes)
363 views9 pages

2020-05-28 - Traffic Analysis Exercise Answers: Page 1 of 9

This document provides answers to questions about analyzing network traffic from a Trickbot infection captured in a pcap file. It details how to use Wireshark filters and examining TCP streams to find: the infected host's IP and name, another infected host, an infected user's email password, and the SHA256 hashes of two executable files transferred in the traffic. Steps are explained for identifying key information in the HTTP requests and responses.

Uploaded by

Het Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
363 views9 pages

2020-05-28 - Traffic Analysis Exercise Answers: Page 1 of 9

This document provides answers to questions about analyzing network traffic from a Trickbot infection captured in a pcap file. It details how to use Wireshark filters and examining TCP streams to find: the infected host's IP and name, another infected host, an infected user's email password, and the SHA256 hashes of two executable files transferred in the traffic. Steps are explained for identifying key information in the HTTP requests and responses.

Uploaded by

Het Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS

Link to exercise: https://www.malware-traffic-analysis.net/2020/05/28/index.html


Links to some tutorials I've written that should help with this exercise:

• Customizing Wireshark - Changing Your Column Display


• Using Wireshark: Identifying Hosts and Users
• Using Wireshark - Display Filter Expressions
• Using Wireshark: Exporting Objects from a Pcap

• Wireshark Tutorial: Examining Trickbot Infections

ENVIRONMENT:
• LAN segment range: 10.5.28.0/24 (10.5.28.0 through 10.5.28.255)
• Domain: catbomber.net
• Domain controller: 10.5.28.8 - Catbomber-DC
• LAN segment gateway: 10.5.28.1
• LAN segment broadcast address: 10.5.28.255

QUESTIONS:
1) Based on the Trickbot infection's HTTP POST traffic, what is the IP
address, host name, and user account name for the infected Windows
client?
2) What is the other user account name and other Windows client host name
found in the Trickbot HTTP POST traffic?
3) What is the infected user's email password?
4) Two Windows executable files are sent in the network traffic. What are the
SHA256 hashes for these files?

ANSWERS:
1) Infected Windows client IP address: 10.5.28.229
Infected Windows client host name: Cat-Bomb-W7-PC
Infected Windows client user account name: phillip.ghent

2) Other Windows client host name: CAT-BOMB-W10-PC


Other Windows client user account name: timothy.sizemore

Page 1 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS

3) Infected user's email account password: gh3ntf@st

4) SHA256 hashes for the two EXE files:

4e76d73f3b303e481036ada80c2eeba8db2f306cbc9323748560843c80b2fed1
934c84524389ecfb3b1dfcb28f9697a2b52ea0ebcaa510469f0d2d9086bcc79a

ANSWERS EXPLAINED:
1) When Trickbot successfully infects a Windows host, it sends an HTTP
POST request with the system data, usually over TCP port 8082. The URL
ends with /90, so use the following Wireshark filter to find that URL and follow
the TCP stream:

http.request.uri contains "/90"

This should return two URLs in your Wireshark column display, one for the
infected Windows client (CAT-BOMB-W7-PC), and one for the domain
controller (CATBOMBER-DC).

Shown above: Filter results looking for the "/90" URLs in the pcap.

Page 2 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS

Shown above: Scroll down a bit in the TCP stream window to find the host
name.

Shown above: Scroll down further to find the infected host's user account
name.

Page 3 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS
2) In the replies to these "/90" URLs, you'll also find a section named
"LOCAL_MACHINE_DATA" in both the URL for the client and the DC. This
should include all hosts found on the network, including other clients and the
DC. I've only found this in cases where the infected client attempts to infect
the DC.

Just scroll down near the end of the TCP stream we were looking at to find
this info.

Shown above: Local_Machine_Data section with information on another


Windows client in the catbomber.net internal network.

Page 4 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS
3) HTTP POST requests that end in "/81" is where we find password data
exfiltrated from an infected Windows host. Use the following Wireshark filters
to find email passwords:

http.request.uri contains "/81" and ip contains mail


http.request.uri contains "/81" and ip contains smtp

Shown above: Finding a URL ending in "/81" for password exfiltration that
contains the string "mail" in the response text.

Shown above: Following the TCP stream and finding the password used for
phillip.ghent's email at catbomber.net.

Page 5 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS
4) We can quickly filter on traffic to see if there's any Windows executable
(EXE) files pass in the clear (not as encoded or encrypted data) using the
following filter:

ip contains "This program"

This doesn't work every single time, but it works for most EXE files. It should
return two frames in your column display. Follow each of these TCP streams.

Shown above: Filtering to find EXE files in the pcap.

Shown above: The first TCP stream shows an EXE file returned from a URL
that ends in imgpaper.png.

Page 6 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS

Shown above: The second TCP stream shows an EXE file returned from a
URL that ends in cursor.png.

Now we've confirmed there are two EXE files in this pcap: one from a URL
ending in imgpaper.png and one with a URL ending in cursor.png. Make
your way to the Export HTTP objects window to export these two files.

Page 7 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS

Shown above: Exporting HTTP objects from the pcap.

Page 8 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS

Shown above: The two objects you need to export for the EXE files.

Once you export these files, you can submit them to VirusTotal, which is not a
good practice (but no problem in this case). A much better solution is to use
the shasum -a 256 command in a terminal window from a Linux environment.

Using the shasum command to get the SHA256 hashes for the two files
exported from the pcap.

Page 9 of 9

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy