zacheller@home:~/blog$

Malware Traffic Analysis Exercise - DYNACCOUNTIC


This challenge is from MALWARE-TRAFFIC-ANALYSIS.NET. Download the PCAP ZIP yourself here. Check their about page for the password.

Scenario

Someone at Dynaccountic has infected their Windows computer. Your manager has tasked you to write an incident report.

Here’s a brief outline of associated network traffic:

  • LAN segment: 10.10.10.0/24 (10.10.10.0 through 10.10.10.255)
  • Broadcast address: 10.10.10.255
  • Domain controller: 10.10.10.3 (DYNACCOUNTIC-DC)
  • Domain: dynaccountic.com

Task

The incident report should include:

  • Date/Time of the infection
  • Who was infected (IP address, host name, MAC address, and user account name)
  • What malware is involved
  • The likely source of this infection
  • Indicators associated with this infection (IP addresses, domains, URLs, and file hashes, if any)

Incident Report

SUMMARY:

On 2018-04-11 at 20:14:26 UTC, a Windows computer used by winford.batiste was infected with Trickbot malware. This infection probably originated from an malicious, spam email. The infected computer was sent to our help desk to be wiped and re-imaged. The user changed all of his associated passwords.

DETAILS:

Infected user’s IP address: 10.10.10.209 Infected user’s MAC addres: 00:30:67:f1:2d:63 Infected user’s host name: BATISTE-PC Infected user’s account name: winford.batiste

INDICATORS:

  • 95.110.193.132:80 - caveaudelteatro.it - GET /ser0410.bin - Trickbot binary download
  • 78.47.139.102:80 - myexternalip.com - GET /raw - check IP
  • 82.214.141.134:449 - SSL/TLS traffic
  • 86.61.160.50:447 - SSL/TLS traffic
  • Malware File
    • Name: ser0410.bin
    • SHA256 Hash: c2c1e2c22f67dda6553cbcc173694b68677b77319243684925e8dc3f78b3dbf8
    • File size: 364,544 bytes
    • File description: Trickbot binary, from caveaudelteatro.it

Details

I used Wireshark to examine the PCAP file. There are a lot of TCP connections between 95.110.193.132 and 10.10.10.209. Following the stream, there is a suspicious HTTP GET request for a binary file located here: caveaudelteatro.it/ser0410.bin. I also noticed a suspicious call to myexternalip.com. I went to File->Export Objects->HTTP to download the bin.

Packet Hostname Content Type Size Filename
420 www.msftncsi.com text/plain 14 bytes ncsi.txt
1035 caveaudelteatro.it application/octet-stream 364 kB ser0410.bin
1053 myexternalip.com text/plain 16 bytes raw

I saved the file, checked its type, and grabbed its SHA256 hash to run through VirusTotal.

root@kali:~# file ser0410.bin
ser0410.bin: PE32 executable (GUI) Intel 80386, for MS Windows
root@kali:~# shasum -a 256 ser0410.bin
c2c1e2c22f67dda6553cbcc173694b68677b77319243684925e8dc3f78b3dbf8  ser0410.bin

Comments on VirusTotal for this hash say that this is Trickbot malware, likely delivered by an invoice scam email.

I filtered by http.request or ssl.handshake.type==1 and confirmed that after the binary is downloaded, the computer’s IP is checked with a GET request to myexternalip.com. And after the external IP determination, 10.10.10.209 communicated over TLSv1 to 82.214.141.134 and 86.61.160.50 on ports 449 and 447, respectively.

I checked the NetBIOS Name Service (NBNS) protocol by filtering with nbns and found BATISTE-PC to be at 10.10.10.209, with MAC address 00:30:67:f1:2d:63. To find the user account name, I looked at this Wireshark Guide which told be to filter on kerberos.CNameString.

I ended up filtering on ip.addr == 10.10.10.209 and kerberos.CNameString, and selecting the CNameString in the body of a packet and selected Apply as Column. Along with BATISTE-PC$ and batiste-pc$, I found our user winford.batiste.