2. 20141123

BASIC QUESTIONS:

What is the IP address of the Windows VM that gets infected?

將所有的http 對象導出來,再用殺毒軟件查殺。

image-20220102165202664

根據文件名定位到數據包

image-20220102165301014

所以就是 172.16.165.132

What is the MAC address of the infected VM?

查看對應的 mac 地址即可。

What is the IP address of the compromised web site?

image-20220102205544509

192.30.138.146

What is the domain name of the compromised web site?

從上題能看出

What is the IP address and domain name that delivered the exploit kit and malware?

ip.dst == 37.143.15.180

What is the domain name that delivered the exploit kit and malware?

image-20220102210923434

MORE ADVANCED QUESTIONS:

What is the exploit kit (EK) that delivers the malware?

image-20220102211016763

What is the redirect URL that points to the exploit kit (EK) landing page?

image-20220103193620800

image-20220103193649353

所以答案就是 http://static.charlotteretirementcommunities.com/k?tstmp=3701802802

老實說,這個 js 沒有明顯的跳轉,國外博客上是這樣解釋的

There is no clear text iframe linking to the exploit kit domain. There is a bit of JavaScript at the bottom which could be assumed to be something of a referral URL.

What is the IP address of the redirect URL that points to the exploit kit (EK) landing page?

查看上一題的 ip 即可。

Submit the pcap to VirusTotal and find out what snort alerts triggered. Do any of the alerts indicate what this exploit kit this is?

直接將流量文件提交到 virustotal

Extract the malware payload from the pcap. What is the MD5 or SHA256 hash?

計算一下那個惡意文件的 md5 即可

EXTRA QUESTIONS:

If you use Suricata, what EmergingThreats signatures fire on the exploit kit traffic?

直接將流量文件提交到 virustotal

What exploit (which CVE) is used by this EK?

直接將流量文件提交到 virustotal ,可以看到 cve-2014-6332

image-20220103194900341

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章