Skip to content

PCAP-based analysis of CryptoLocker and Word-Dropper malware samples using Wireshark and REMnux. Focus on DNS, HTTP, and TLS artifacts to identify adversary behavior and exfiltration attempts.

License

Notifications You must be signed in to change notification settings

usrtem/Malware-Network-Analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ“‘ Malware Network Traffic & Packet Analysis

Network Traffic Analysis

This repository contains a packet-level malware behavior analysis using PCAPs for CryptoLocker and Word-Dropper samples. The investigation was conducted using Wireshark on a REMnux VM, with emphasis on DNS, HTTP, and TLS traffic.

πŸ“„ Contents

πŸ” Techniques Covered

  • DNS Query Analysis
    Identification of suspicious or anomalous outbound DNS queries and IP resolution patterns.

  • HTTP & TLS Inspection
    Use of GET/POST request tracing to reveal encrypted payload behavior within unencrypted HTTP sessions.

  • IP Reputation Verification
    Use of open-source intelligence (e.g., IPinfo) to validate threat indicators.

  • Wireshark Filters & Statistics
    Filtering for DNS, HTTP, and TLS streams; object export; and resolving IP behavior by hostname.

🚩 Findings Summary

  • Multiple domains resolved to suspicious IPs hosted outside of trusted environments.
  • Encrypted payloads were observed being transferred over HTTP β€” suggesting obfuscation.
  • Analysis of GET request failures suggested attempts to probe or exploit specific file paths on targets.
  • Signature behaviors matched known tactics of CryptoLocker and Word-Dropper.

πŸ”§ Tools Used

  • Wireshark
  • REMnux (Linux forensic distribution)
  • IPinfo.io
  • DNS/HTTP filter expressions

πŸ‘€ Author

Michael Twining
Cybersecurity Researcher | Network & Malware Analyst | GitHub: @usrtem
πŸ“« michael.twining@outlook.com
🌐 LinkedIn | YouTube

πŸ” License

This project is released under the Creative Commons Attribution 4.0 International License.

About

PCAP-based analysis of CryptoLocker and Word-Dropper malware samples using Wireshark and REMnux. Focus on DNS, HTTP, and TLS artifacts to identify adversary behavior and exfiltration attempts.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published