Forensic

dimanche 19 mars 2017, 15:58  #1
Command & Control - level 4
hpanago
  • 3 posts

Well, it looks like I have found the connections that had been established but none of the IPs seems correct.

Can someone help me ? I am looking for connections made by the malware, no ? Also, there are like on 3 programs that generated any traffic what so ever, right ?

jeudi 13 juillet 2017, 23:55  #2
Command & Control - level 4
Liam
  • 1 posts

I’m on the same boat as you. From the last one, C&C3 I know the PID of the malicious software, (Starts and ends with "2" if I’m right), so I use the netscan tool on Volatility and look for that PID. I find it, but its wrong apparently. =C The IP should be an internal one since this is an "internal server" but no luck yet !

jeudi 2 novembre 2017, 04:49  #3
Command & Control - level 4
drutt1997
  • 2 posts

Im stuck like Liam . anyone help us pls

samedi 13 janvier 2018, 21:18  #4
Command & Control - level 4
feuerstein
  • 2 posts

I’ve reengineered the malware and I ḱnow exactly what it does (one of 4 destinations exists), but the IP:PORT doesn’t validate. The "internal server"-thing is bit confusing. All I can see is an internal gateway (avast) on port 12080.

Edit : nvm. I found it finally

jeudi 6 août 2020, 15:36  #5
Command & Control - level 4
jemphare
  • 2 posts

I spend time stuck on the network traffic analysis, try to change perspective and focus on IDs...

mardi 27 octobre 2020, 03:28  #6
Command & Control - level 4
Onkar
  • 2 posts

Dump malicious process and use strings to search IP.