Thanks to Brad Duncan for sharing this pcap:
https://www.malware-traffic-analysis.net/2023/10/18/index.html
We did a quick analysis of this pcap on the NEW Security Onion 2.4. If you’d like to follow along, you can do the following:
- install Security Onion 2.4 in a VM:
https://docs.securityonion.net/en/2.4/first-time-users.html - import the pcap using so-import-pcap:
https://docs.securityonion.net/en/2.4/so-import-pcap.html#so-import-pcap - optionally enable the new DNS lookups feature:
https://docs.securityonion.net/en/2.4/soc-customization.html?#reverse-dns-lookups
The screenshots at the bottom of this post show some of the interesting alerts, metadata logs, and session transcripts. Want more practice? Check out our other Quick Malware Analysis posts at:
https://blog.securityonion.net/search/label/quick%20malware%20analysis
About Security Onion
Security Onion is a versatile and scalable platform that can run on small virtual machines and can also scale up to the opposite end of the hardware spectrum to take advantage of extremely powerful server-class machines. Security Onion can also scale horizontally, growing from a standalone single-machine deployment to a full distributed deployment with tens or hundreds of machines as dictated by your enterprise visibility needs. To learn more about Security Onion, please see https://securityonion.net.
Screenshots
First, we start with the overview of all alerts and logs:
Next, we focus on just alerts:
Here is a group of alerts for the same TCP stream:
Pivoting to PCAP and then to ASCII transcript, we can see the executable file:
Next, let’s review this group of alerts for the same TCP stream:
Pivoting to transcript, we see the executable:
Here are the interesting DNS lookups:
Here are SSL/TLS connections:
Here is some interesting traffic:
Pivoting to transcript, we can see that this is VNC:
















