Thursday, May 19, 2022

Quick Malware Analysis: Exotic Lily, Bumblebee, and Cobalt Strike pcap from 2022-05-18

Thanks to Brad Duncan for sharing this pcap!
https://www.malware-traffic-analysis.net/2022/05/18/index2.html

We did a quick analysis of this pcap on the latest version of Security Onion via so-import-pcap:
https://docs.securityonion.net/en/2.3/so-import-pcap.html

The screenshots below show some of the interesting Suricata alerts, Zeek logs, session transcripts, and observables.

About Security Onion

Security Onion is a versatile and scalable platform that can run on small virtual machines and can also scale up to the opposite end of the hardware spectrum to take advantage of extremely powerful server-class machines.  Security Onion can also scale horizontally, growing from a standalone single-machine deployment to a full distributed deployment with tens or hundreds of machines as dictated by your enterprise visibility needs.

To learn more about Security Onion, please see:
https://securityonion.net
https://securityonion.net/docs

More Samples

Find all of our Quick Malware posts at:
https://blog.securityonion.net/search/label/quick%20malware%20analysis

Screenshots

Click the first image to start the screenshot tour:















Wednesday, May 18, 2022

Sneak Peek: Security Onion 2.3.130 and New Analyzers Feature

We recently released the first sneak peek of our upcoming Security Onion 2.3.130 release and its new Dashboards app. Today, let’s look at another new feature in Security Onion 2.3.130. This release will include analyzers allowing you to quickly gather context around an observable. Analyzers can leverage multiple internal and external sources of data without ever having to leave SOC!


Let’s start by going to the OBSERVABLES tab inside of a case. From the screenshot below, we can see we are working with an observable of type hash and a value of 8a62d103168974fba9c61edab336038c. To start analysis for this observable, we click the lightning bolt icon to the left of the observable creation date. At this point, an analyzer job is enqueued for each analyzer that supports the hash data type and results will be returned once all analyzers have completed their analysis.



Here, we can see results for analysis against a local file, Team Cymru’s Malware Hash Registry, Alienvault OTX, Pulsedive, and VirusTotal. All of these analyzers were initiated automatically since they support the hash observable type.


Each analyzer will have a brief description of the outcome of the analysis, such as No results found, Further investigation needed, or Malicious. We can expand the details for each analyzer to find more information. For example, here are the malwarehashregistry and virustotal sections.




In addition to the hash data type, several other types are supported by analyzers, including domain, ip, url, and more – even ja3!


If the supported data types don’t fit your needs, you can use the localfile analyzer. This will allow you to leverage multiple CSV files if desired, utilizing a data type of other and providing threat intel or other associative information that could contribute to overall context.


In addition to the included analyzers, you can also write your own custom analyzers in Python if you need to leverage other data sources or perform analysis in a different manner.


Security Onion 2.3.130 is coming soon! Until then, here’s what the analyzers feature looks like in action!

Quick Malware Analysis: Qakbot and Cobalt Strike pcap from 2022-04-14

Thanks to Brad Duncan for sharing this pcap!
https://www.malware-traffic-analysis.net/2022/04/14/index.html

We did a quick analysis of this pcap on the latest version of Security Onion via so-import-pcap:
https://docs.securityonion.net/en/2.3/so-import-pcap.html

The screenshots below show some of the interesting Suricata alerts, Zeek logs, session transcripts, and observables.

About Security Onion

Security Onion is a versatile and scalable platform that can run on small virtual machines and can also scale up to the opposite end of the hardware spectrum to take advantage of extremely powerful server-class machines.  Security Onion can also scale horizontally, growing from a standalone single-machine deployment to a full distributed deployment with tens or hundreds of machines as dictated by your enterprise visibility needs.

To learn more about Security Onion, please see:
https://securityonion.net
https://securityonion.net/docs

More Samples

Find all of our Quick Malware posts at:
https://blog.securityonion.net/search/label/quick%20malware%20analysis

Screenshots

Click the first image to start the screenshot tour: