Wednesday, December 20, 2023

Quick Malware Analysis: ICEDID BOKBOT infection pcap from 2023-07-25

Thanks to Brad Duncan for sharing this pcap from 2023-07-25 on his malware traffic analysis site! Google currently has a warning for the site, so we're not including the actual hyperlink but it should be easy to find.

We did a quick analysis of this pcap on the NEW Security Onion 2.4. If you'd like to follow along, you can do the following:

The screenshots at the bottom of this post show some of the interesting alerts, metadata logs, and session transcripts. Want more practice? Check out our other Quick Malware Analysis posts at:

About Security Onion

Security Onion is a versatile and scalable platform that can run on small virtual machines and can also scale up to the opposite end of the hardware spectrum to take advantage of extremely powerful server-class machines.  Security Onion can also scale horizontally, growing from a standalone single-machine deployment to a full distributed deployment with tens or hundreds of machines as dictated by your enterprise visibility needs. To learn more about Security Onion, please see:

Do you want to deploy the new Security Onion 2.4 to your enterprise but need training? We just announced a new class with 10% discount:

Do you want to deploy Security Onion to your enterprise and want the best enterprise hardware? Here are the top 5 reasons to purchase appliances from Security Onion Solutions:


First, we start with the overview of all alerts and logs:

Next, let's focus on just the alerts:

Let's look at the Win32/IcedID Request alerts:

Both of these alerts are for the same TCP stream, so let's take a look at the full packet capture for that stream:

Now let's switch to the ASCII transcript:

Next, let's review all of the protocol metadata:

Let's begin our tour of the protocol metadata with HTTP:

One of these HTTP transactions is a 302 redirect:

Next let's review DNS lookups:

Next let's look at SSL logs:

Notice that there's an interesting organization name of "Stark Industries Solutions Ltd" with 2 interesting domain names:

If we switch to Zeek Notices we see that the Stark Industries certificates were self-signed:

Here's an overview of all connections:

If we sort those connections by client.ip_bytes, we will find one client connection that transferred much more data than the others:

We can then drill into that connection:

Pivoting to PCAP, we see evidence that this is VNC:

We can then download the PCAP and open it in NetworkMiner (included in Security Onion Desktop). The Images tab shows what was transferred via VNC:

We can then open those images to get a sense of what was happening via VNC:

Back in NetworkMiner, we can go to the Parameters tab and see the keystrokes for being sent over VNC:

No comments:

Search This Blog

Featured Post

Quick Malware Analysis: WORD MACRO --> SSLOAD --> COBALT STRIKE pcap from 2024-04-18

Thanks to Brad Duncan for sharing this pcap from 2024-04-18 on his malware traffic analysis site! Due to issues with Google flagging a warni...

Popular Posts

Blog Archive