HoneyBOT
Q1. What is the attacker's IP address?
We can see that the Source address
field of the first packet is 98.114.205.102
.
Answer
98.114.205.102
Q2. What is the target's IP address?
The target's IP address is included in the Destination address
field.
Answer
192.150.11.111
Q3. Provide the country code for the attacker's IP address (a.k.a geo-location).
We can obtain more information about the attacker's IP address using IPinfo.
Answer
US
Q4. How many TCP sessions are present in the captured traffic?
We can find TCP sessions by selecting the Statistics > Conversations
option.
We can see that there are 5 TCP sessions present.
Answer
5
Q5. How long did it take to perform the attack (in seconds)?
Let us set the time display format to Seconds since beginning of capture
.
We can see that the last packet arrives around 16 seconds after the first packet. So it took 16 seconds to perform the attack.
Answer
16
Q7. Provide the CVE number of the exploited vulnerability.
Using the following filter we can filter out SMB packets.
smb
On observing the packets, we can see a few DSSETUP
packets. These are used to obtain information about a remote hosts Active Directory.
The Operation
field is set to DsRoleUpgradeDownlevelServer
.
A quick google search gives us the CVE number of the exploited vulnerability.
It exploits a buffer overflow which in turn allows the attacker to perform ACE in order to create long debug entries.
Answer
CVE-2003-0533
Q8. Which protocol was used to carry over the exploit?
As we saw in the previous question, the protocol used was SMB.
Answer
SMB
Q9. Which protocol did the attacker use to download additional malicious files to the target system?
Let us follow the stream through Analyze > Follow > TCP Stream
.
On checking the 3rd TCP stream we can see the steps performed by the attacker.
These steps resemble that of a FTP login sequence.
Alternatively, in TCP stream 2 we can see the command executed by the attacker.
The attacker ran the ftp
command using the script file o
and disabled auto-login using the n
flag.
Answer
ftp
Q10. What is the name of the downloaded malware?
Again in TCP stream 3 we can see that the attacker retrieved the copy of the ssms.exe
file.
In TCP stream 2 we can see that the attacker executed the ssms.exe
file.
Answer
ssms.exe
Q11. The attacker's server was listening on a specific port. Provide the port number.
In the 2nd TCP stream, we can see port 8884
specified in the echo
command.
The result of this command is redirected into the script file o
used during FTP login.
Answer
8884
Q12. When was the involved malware first submitted to VirusTotal for analysis? Format: YYYY-MM-DD
TCP stream 4 contains the file sent from the attacker to the victim.
We can download this file in the raw format via Save as... > Raw
.
Using the md5sum
command we can find the hash of the saved file.
$ md5sum malware
14a09a48ad23fe0ea5a180bee8cb750a malware
We can now search up this file hash using VirusTotal.
Answer
2007-06-27