2025-01-22 - TRAFFIC ANALYSIS EXERCISE: DOWNLOAD FROM FAKE SOFTWARE SITE
ASSOCIATED FILE:
NOTES:
- Zip files are password-protected. Of note, this site has a new password scheme. For the password, see the "about" page of this website.
BACKGROUND
You work as an analyst at a Security Operation Center (SOC). Someone contacts your team to report a coworker has downloaded a suspicious file after searching for Google Authenticator. The caller provides some information similar to social media posts at:
Based on the caller's initial information, you confirm there was an infection. You retrieve a packet capture (pcap) of the associated traffic. Reviewing the traffic, you find several indicators matching details from a Github page referenced in the above social media posts. After confirming an infection happened, you begin writing an incident report.
LAN SEGMENT DETAILS FROM THE PCAP
- LAN segment range: 10.1.17[.]0/24 (10.1.17[.]0 through 10.1.17[.]255)
- Domain: bluemoontuesday[.]com
- Active Directory (AD) domain controller: 10.1.17[.]2 - WIN-GSH54QLW48D
- AD environment name: BLUEMOONTUESDAY
- LAN segment gateway: 10.1.17[.]1
- LAN segment broadcast address: 10.1.17[.]255
TASK
For this exercise, answer the following questions for your incident report:
- What is the IP address of the infected Windows client?
- What is the mac address of the infected Windows client?
- What is the host name of the infected Windows client?
- What is the user account name from the infected Windows client?
- What is the likely domain name for the fake Google Authenticator page?
- What are the IP addresses used for C2 servers for this infection?
ANSWERS
- Click here for the answers.
Click here to return to the main page.
文章来源: https://www.malware-traffic-analysis.net/2025/01/22/index.html
如有侵权请联系:admin#unsafe.sh