Friday, December 6, 2024

Quick Malware Analysis: AGENTTESLA VARIANT USING FTP pcap from 2024-12-04

Thanks to Brad Duncan for sharing this pcap from 2024-12-04 on his malware traffic analysis site! Due to issues with Google flagging a warning for the site, we're not including the actual hyperlink but it should be easy to find.


We did a quick analysis of this pcap using Security Onion 2.4.110:

https://blog.securityonion.net/2024/10/security-onion-24110-hurricane-helene.html


If you'd like to follow along, you can do the following:



The screenshots at the bottom of this post show some of the interesting alerts, metadata logs, and session transcripts. Want more practice? Check out our other Quick Malware Analysis posts at:

https://blog.securityonion.net/search/label/quick%20malware%20analysis


About Security Onion


Security Onion is a versatile and scalable platform that can run on small virtual machines and can also scale up to the opposite end of the hardware spectrum to take advantage of extremely powerful server-class machines.  Security Onion can also scale horizontally, growing from a standalone single-machine deployment to a full distributed deployment with tens or hundreds of machines as dictated by your enterprise visibility needs. To learn more about Security Onion, please see:
https://securityonion.net


Screenshots


First, we start with the overview of all alerts and logs:


Next, let's look at just the alerts:


Let's drill into the ET MALWARE AgentTesla Exfil via FTP alert:


Let's pivot to full packet capture for the stream:


Switching to ASCII transcript makes it easier to read:


Let's see the related Zeek FTP logs:



We see the same TCP stream as the alert but we also see a new one so let's pivot to PCAP:


Now let's look at the FTP Data:



Here are the actual files transferred:






No comments:

Post a Comment

Note: Only a member of this blog may post a comment.