2020-05-28 - Traffic Analysis Exercise Answers: Page 1 of 9
2020-05-28 - Traffic Analysis Exercise Answers: Page 1 of 9
ENVIRONMENT:
• LAN segment range: 10.5.28.0/24 (10.5.28.0 through 10.5.28.255)
• Domain: catbomber.net
• Domain controller: 10.5.28.8 - Catbomber-DC
• LAN segment gateway: 10.5.28.1
• LAN segment broadcast address: 10.5.28.255
QUESTIONS:
1) Based on the Trickbot infection's HTTP POST traffic, what is the IP
address, host name, and user account name for the infected Windows
client?
2) What is the other user account name and other Windows client host name
found in the Trickbot HTTP POST traffic?
3) What is the infected user's email password?
4) Two Windows executable files are sent in the network traffic. What are the
SHA256 hashes for these files?
ANSWERS:
1) Infected Windows client IP address: 10.5.28.229
Infected Windows client host name: Cat-Bomb-W7-PC
Infected Windows client user account name: phillip.ghent
Page 1 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS
4e76d73f3b303e481036ada80c2eeba8db2f306cbc9323748560843c80b2fed1
934c84524389ecfb3b1dfcb28f9697a2b52ea0ebcaa510469f0d2d9086bcc79a
ANSWERS EXPLAINED:
1) When Trickbot successfully infects a Windows host, it sends an HTTP
POST request with the system data, usually over TCP port 8082. The URL
ends with /90, so use the following Wireshark filter to find that URL and follow
the TCP stream:
This should return two URLs in your Wireshark column display, one for the
infected Windows client (CAT-BOMB-W7-PC), and one for the domain
controller (CATBOMBER-DC).
Shown above: Filter results looking for the "/90" URLs in the pcap.
Page 2 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS
Shown above: Scroll down a bit in the TCP stream window to find the host
name.
Shown above: Scroll down further to find the infected host's user account
name.
Page 3 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS
2) In the replies to these "/90" URLs, you'll also find a section named
"LOCAL_MACHINE_DATA" in both the URL for the client and the DC. This
should include all hosts found on the network, including other clients and the
DC. I've only found this in cases where the infected client attempts to infect
the DC.
Just scroll down near the end of the TCP stream we were looking at to find
this info.
Page 4 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS
3) HTTP POST requests that end in "/81" is where we find password data
exfiltrated from an infected Windows host. Use the following Wireshark filters
to find email passwords:
Shown above: Finding a URL ending in "/81" for password exfiltration that
contains the string "mail" in the response text.
Shown above: Following the TCP stream and finding the password used for
phillip.ghent's email at catbomber.net.
Page 5 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS
4) We can quickly filter on traffic to see if there's any Windows executable
(EXE) files pass in the clear (not as encoded or encrypted data) using the
following filter:
This doesn't work every single time, but it works for most EXE files. It should
return two frames in your column display. Follow each of these TCP streams.
Shown above: The first TCP stream shows an EXE file returned from a URL
that ends in imgpaper.png.
Page 6 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS
Shown above: The second TCP stream shows an EXE file returned from a
URL that ends in cursor.png.
Now we've confirmed there are two EXE files in this pcap: one from a URL
ending in imgpaper.png and one with a URL ending in cursor.png. Make
your way to the Export HTTP objects window to export these two files.
Page 7 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS
Page 8 of 9
2020-05-28 - TRAFFIC ANALYSIS EXERCISE ANSWERS
Shown above: The two objects you need to export for the EXE files.
Once you export these files, you can submit them to VirusTotal, which is not a
good practice (but no problem in this case). A much better solution is to use
the shasum -a 256 command in a terminal window from a Linux environment.
Using the shasum command to get the SHA256 hashes for the two files
exported from the pcap.
Page 9 of 9