{"id":457,"date":"2016-04-22T17:00:49","date_gmt":"2016-04-22T16:00:49","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=457"},"modified":"2016-04-22T17:00:49","modified_gmt":"2016-04-22T16:00:49","slug":"malware-exercise-2016-04-16-playing-detective","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=457","title":{"rendered":"Malware Exercise 2016-04-16 Playing detective"},"content":{"rendered":"<p>So here is my answers for the latest exercise from Brad. This one threw me off a bit as I thought that I was missing something when reviewing the PCAP since I was not seeing the &#8220;usual&#8221; things that I have come to expect from Brad when doing these exercises. It reminded me of when I was in school and would get through an exam with plenty of time to spare. I would then look around and see that the rest of the class was still chugging through the test. Then self-doubt would kick in. Did I miss something, or did I rush through this? And then I would spend the rest of the time double checking my answers and second-guessing myself.<\/p>\n<p>So here are my results from this exercise. Hopefully I did not miss something&#8230; <\/p>\n<p>About the Investigation<br \/>\n=======================<br \/>\n\u2013 Date and time range of the traffic you\u2019re reviewing.<br \/>\n&gt; First packet: 2016-04-15 23:50:49 \/ Last packet: 2016-04-16 00:01:19<\/p>\n<p>\u2013 IP address, MAC address, username, and host name.<br \/>\n&gt; 172.16.155.254 \/ 00:0b:46:7f:9e:22 \/ manny.lehman@mailinator.com \/ MANNY-PC<\/p>\n<p>\u2013 Description of the activity (what happened, if the host became infected, any details, etc.).<br \/>\n&gt; Based on what I am seeing in the PCAP, the user used Bing to find the website &#8220;billinggoldspal[.]com.&#8221; The site landed the user on a fake login page for what looks like an Apple page. The user then proceeded to enter their information into this fake site. Outside of that, there does not look to be anything malicious in the traffic or anything malicious downloaded to the user&#8217;s system.<\/p>\n<p>\u2013 A conclusion with recommendations for any follow-up actions.<br \/>\n&gt; User education on what to look for when it comes to phishing sites asking for the user&#8217;s information would be a great start. I would also block this IP\/FQDN at the perimeter to make sure that the user cannot visit this site again from the corperate network.<\/p>\n<p>\u2013 Indicators of Compromise (IP, FQDN, etc\u2026)<br \/>\n&gt; 91.194.91.203 \/ billinggoldspal[.]com<\/p>\n<p>About the Investigation<br \/>\n=======================<br \/>\n\u2013 Date and time range of the traffic you\u2019re reviewing.<br \/>\n&gt; First packet: 2016-04-15 23:50:49 \/ Last packet: 2016-04-16 00:01:19<\/p>\n<p>\u2013 IP address, MAC address, username, and host name.<br \/>\n&gt; 172.16.155.254 \/ 00:0b:46:7f:9e:22 \/ manny.lehman@mailinator.com \/ MANNY-PC<\/p>\n<p>\u2013 Description of the activity (what happened, if the host became infected, any details, etc.).<br \/>\n&gt; Based on what I am seeing in the PCAP, the user used Bing to find the website &#8220;billinggoldspal[.]com.&#8221; The site landed the user on a fake login page for what looks like an Apple page. The user then proceeded to enter their information into this fake site. Outside of that, there does not look to be anything malicious in the traffic or anything malicious downloaded to the user&#8217;s system.<\/p>\n<p>\u2013 A conclusion with recommendations for any follow-up actions.<br \/>\n&gt; User education on what to look for when it comes to phishing sites asking for the user&#8217;s information would be a great start. I would also block this IP\/FQDN at the perimeter to make sure that the user cannot visit this site again from the corperate network.<\/p>\n<p>\u2013 Indicators of Compromise (IP, FQDN, etc\u2026)<br \/>\n&gt; 91.194.91.203 \/ billinggoldspal[.]com<\/p>\n<p>Notes from the investigation:<br \/>\n=============================<\/p>\n<p>Performing the usual steps for when I look at these types of PCAPs (Statistics &#8211;&gt; Protocol Hierarchy and Conversations) showed that most of the communication was over TCP and via ports 80 and 443. There was no evidence of any callbacks on strange ports or anything like that. I also noticed that the DNS of the system was setup for Google&#8217;s DNS servers and not the local ISP&#8217;s DNS or the router that the system was sitting behind. From there I used the filter of &#8220;http.request&#8221; to see what sites were found in the PCAP while also looking at the HTTP Objects as well to see what types of files are in the PCAP. Nothing stood out here.<\/p>\n<p>I then used the alerts found Suricuta which gave me a clue:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nCount:1 Event#3.13546 2016-04-15 23:34:01\r\nETPRO CURRENT_EVENTS Successful Paypal Phish Dec 8 M2\r\n172.16.155.149 -&amp;gt; 91.194.91.203\r\nIPVer=4 hlen=5 tos=0 dlen=634 ID=0 flags=0 offset=0 ttl=0 chksum=47435\r\nProtocol: 6 sport=49273 -&amp;gt; dport=80&lt;\/code&gt;\r\n\r\nSeq=0 Ack=0 Off=5 Res=0 Flags=******** Win=0 urp=3 chksum=0<\/pre>\n<p>Looking at the page via the filter &#8220;http.host == &#8220;billinggoldspal.com&#8221;&#8221; I then proceeded to see what looked to be a fake Apple site as you can see below:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\tGET \/cola\/153b7ff4a55eb44e549bcd88c8c11368\/index\/web\/Login\/index.php HTTP\/1.1\r\n\tAccept: text\/html, application\/xhtml+xml, *\/*\r\n\tAccept-Language: en-US\r\n\tUser-Agent: Mozilla\/5.0 (Windows NT 6.1; Trident\/7.0; rv:11.0) like Gecko\r\n\tAccept-Encoding: gzip, deflate\r\n\tHost: billinggoldspal.com\r\n\tDNT: 1\r\n\tConnection: Keep-Alive\r\n\t\r\n\tHTTP\/1.1 200 OK\r\n\tDate: Fri, 15 Apr 2016 22:55:03 GMT\r\n\tServer: Apache\/2.4.18 (Unix) OpenSSL\/1.0.1e-fips mod_bwlimited\/1.4\r\n\tX-Powered-By: PHP\/5.5.33\r\n\tKeep-Alive: timeout=5, max=100\r\n\tConnection: Keep-Alive\r\n\tTransfer-Encoding: chunked\r\n\tContent-Type: text\/html<\/pre>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/04\/Screen-Shot-2016-04-22-at-4.39.20-PM.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/04\/Screen-Shot-2016-04-22-at-4.39.20-PM.png\" alt=\"\" width=\"1706\" height=\"1094\" class=\"aligncenter size-full wp-image-461\" \/><\/a><\/p>\n<p>I also see that there are some POSTS as well to this site. Using the &#8220;http.request.method == &#8220;POST&#8221;&#8221; filter, I see that the user did believe that this was a legit site and gave the actor all the information that they were wanting as you can see below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/04\/IMG1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/04\/IMG1.png\" alt=\"\" width=\"2150\" height=\"733\" class=\"aligncenter size-full wp-image-448\" \/><\/a><br \/>\n<a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/04\/IMG2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/04\/IMG2.png\" alt=\"\" width=\"2148\" height=\"808\" class=\"aligncenter size-full wp-image-446\" \/><\/a><br \/>\n<a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/04\/IMG3.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/04\/IMG3.png\" alt=\"\" width=\"2145\" height=\"903\" class=\"aligncenter size-full wp-image-447\" \/><\/a><br \/>\n<a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/04\/IMG4.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/04\/IMG4.png\" alt=\"\" width=\"2149\" height=\"819\" class=\"aligncenter size-full wp-image-449\" \/><\/a><\/p>\n<p>From there I am not seeing anything else malicious in traffic. Checking Virustotal for this site, I am seeing that this has been labeled as a malicious site:<\/p>\n<p>\tURL: hxxp[:]\/\/billinggoldspal[.]com\/cola\/153b7ff4a55eb44e549bcd88c8c11368\/index\/web\/Login\/index.php<br \/>\n\tFirst Submission: 2016-04-15 23:45:44 UTC<br \/>\n\tDetection ratio: 8 \/ 67<br \/>\n\tVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/url\/2b235f9d2e960accdb6803f75dad149c679815328ce933d0fcc94a083352ea0c\/analysis\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/url\/2b235f9d2e960accdb6803f75dad149c679815328ce933d0fcc94a083352ea0c\/analysis\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>So here is my answers for the latest exercise from Brad. This one threw me off a bit as I thought that I was missing something when reviewing the PCAP since I was not seeing the &#8220;usual&#8221; things that I have come to expect from Brad when doing these exercises. It reminded me of when I was in school and would get through an exam with plenty of time to spare. I would then look around and see that the rest of the class was still chugging through the test. Then self-doubt would kick in. Did I miss something, or&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=457\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-457","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=457"}],"version-history":[{"count":11,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/457\/revisions"}],"predecessor-version":[{"id":476,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/457\/revisions\/476"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}