Network Analysis - Ransomware

1 minute read

Lab URL: https://blueteamlabs.online/home/challenge/network-analysis-ransomware-3dd520c7ec

Question 1

What is the operating system of the host from which the network traffic was captured?

remnux@remnux:~/Downloads/BTLO Network Analysis - Ransomware/Challenge Files$ file *

help_recover_instructions.HTM: HTML document, ASCII text, with very long lines
help_recover_instructions.png: PNG image data, 1150 x 1000, 8-bit/color RGBA, non-interlaced
help_recover_instructions.TXT: ASCII text, with CRLF line terminators
ransom_traffic.pcapng:         pcapng capture file - version 1.0
Tender.pdf.micro:              data

networkforensics

wireshark ransom_traffic.pcapng

Statistics > Capture File Properties

networkforensics

networkforensics

Answer: 32-bit Windows 7 Service Pack 1, build 7601

Question 2

What is the full URL from which the ransomware executable was downloaded?

Packet 59

networkforensics

Answer: http://10.0.2.15:8000/safecrypt.exe

Question 3

Name the ransomware executable file?

Packet 59

networkforensics

OR

File > Export Objects > HTTP

networkforensics

networkforensics

Answer: safecrypt.exe

Question 4

What is the MD5 hash of the ransomware?

File > Export Objects > HTTP > Save

networkforensics

Answer: 4a1d88603b1007825a9c6b36d1e5de44

Question 5

What is the name of the ransomware?

Search hash in the VirusTotal

networkforensics

Answer: teslacrypt

Question 6

What is the encryption algorithm used by the ransomware, according to the ransom note?

cat help_recover_instructions.TXT  |grep encryption

networkforensics

Answer: RSA-4096

Question 7

What is the domain beginning with ā€˜d’ that is related to ransomware traffic?

networkforensics

Answer: dunyamuzelerimuzesi.com

Question 8

Decrypt the Tender document and submit the flag

Download a decryptor
https://success.trendmicro.com/en-US/solution/KA-0006362

networkforensics

Run

wine RansomwareFileDecryptor\ 1.0.1668\ MUI.exe 

networkforensics

networkforensics

networkforensics

networkforensics

networkforensics

networkforensics

Answer: BTLO-T3nd3r-Fl@g

Thank you for taking the time to read this write-up! I hope you found it insightful and helpful.

Keep learning and stay sharp. šŸ‘Š