Carnage

Task 1 - Scenario

Read the above.

no need to answer!

Task 2 - Traffic Analysis

What was the date and time for the first HTTP connection to the malicious IP?

2021-09-24 16:44:38 

What is the name of the zip file that was downloaded?

documents.zip

What was the domain hosting the malicious zip file?

attirenepal.com

Without downloading the file, what is the name of the file in the zip file?

chart-1530076591.xls

What is the name of the webserver of the malicious IP from which the zip file was downloaded?

LiteSpeed

What is the version of the webserver from the previous question?

PHP/7.2.34

Malicious files were downloaded to the victim host from multiple domains. What were the three domains involved with this activity?

finejewels.com.au, thietbiagt.com, new.americold.com

Which certificate authority issued the SSL certificate to the first domain from the previous question?

godaddy

What are the two IP addresses of the Cobalt Strike servers? Use VirusTotal (the Community tab) to confirm if IPs are identified as Cobalt Strike C2 servers. (answer format: enter the IP addresses in sequential order)

185.106.96.158, 185.125.204.174

What is the Host header for the first Cobalt Strike IP address from the previous question?

ocsp.verisign.com

What is the domain name for the first IP address of the Cobalt Strike server? You may use VirusTotal to confirm if it's the Cobalt Strike server (check the Community tab).

survmeter.live

What is the domain name of the second Cobalt Strike server IP? You may use VirusTotal to confirm if it's the Cobalt Strike server (check the Community tab).

securitybusinpuff.com

What is the domain name of the post-infection traffic?

maldivehost.net

What are the first eleven characters that the victim host sends out to the malicious domain involved in the post-infection traffic?

zLIisQRWZI9

What was the length for the first packet sent out to the C2 server?

281

What was the Server header for the malicious domain from the previous question?

Apache/2.4.49 (cPanel) OpenSSL/1.1.1l mod_bwlimited/1.4

The malware used an API to check for the IP address of the victim’s machine. What was the date and time when the DNS query for the IP check domain occurred? (answer format: yyyy-mm-dd hh:mm:ss UTC)

2021-09-24 17:00:04

What was the domain in the DNS query from the previous question?

api.ipify.org

Looks like there was some malicious spam (malspam) activity going on. What was the first MAIL FROM address observed in the traffic?

farshin@mailfa.com

How many packets were observed for the SMTP traffic?

1439

Last updated

Was this helpful?