Malware compromise
BTLO challenge, begun on 13.12.2022, finished on 13.12.2022
ok unzipping to get pcap file
ok now i can put this through wireshark but i can also strings it and try to answer questions like that. this will accomplish nothing special, i just have one less task to do.
you know this feels very disingenuous i dont know why let me open up wireshark lol.
so following tcp stream shows me the GET/images... request coming from cochrimato.com
oh and the host ip is 10.11.27.101, thats in the first domain name query. also in the endpoints.
ok so filtered by tcp.stream eq 0(btw i googled what the eq 0, eq 1 means and its just a hierarchy definition by wireshark. so the first followed/retrieved stream is 0, then 1 etc etc). and the filename is spet10.spr
http://95.181.198.231/oiioiashdqbwe.rar is the url from where the post dreidex malware is received. got it by following tcp.stream eq 11
then going a little bit further we see 10.11.27.101 establishing a connection with 83.166.247.211 and then application data being transferred with tls encryption, after which the ip is 185.244.150.230, so thats the answer
Done!

Comments
Post a Comment