Skip to content

mrtnzjhonatan/Network-Traffic-Analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Network Traffic Analysis – Malware Investigation

Overview

This project documents a network traffic analysis lab focused on identifying unusual behavior and potential Indicators of Compromise (IoCs) associated with Wikiloader malware.

Using Wireshark, I examined packet captures from a compromised system to investigate suspicious communications, identify potentially malicious infrastructure, and trace post-infection command-and-control activity.

The packet capture analyzed in this lab was:

  • 2024-01-17.pcap

P.cap


Objective

The goal of this investigation was to:

  • Analyze traffic from an infected host
  • Identify suspicious HTTPS, DNS, and MQTT activity
  • Extract possible Indicators of Compromise (IoCs)
  • Understand how malware communicates after infection

Tools Used

  • Wireshark
  • PCAP analysis
  • HTTPS filtering
  • TLS handshake inspection
  • DNS analysis
  • MQTT traffic inspection

Investigation Summary

The investigation focused on multiple stages of malicious network behavior:

  1. Identifying suspicious HTTPS traffic
  2. Inspecting TLS handshakes and the SNI field
  3. Looking for repeated DNS queries that may indicate persistent communication
  4. Identifying post-infection command-and-control (C2) activity over MQTT

Step 1 – Investigate Captured HTTPS Traffic

To identify possible delivery infrastructure for the malicious payload, I filtered the traffic to show HTTPS communications over port 443.

Wireshark Filter

tcp.port == 443

Packet #320 showed Application Data with a source IP address of:

  • 104.21.3.175

HTTPS Traffic Filter

Observation

Filtering HTTPS traffic helped isolate encrypted communications that may be related to the initial payload delivery or follow-on malware activity.


Step 2 – Analyze TLS Handshakes

TLS handshake analysis can reveal valuable metadata even when the payload itself is encrypted. In particular, the Server Name Indication (SNI) field can show the hostname the client attempted to contact.

Wireshark Filter

tls.handshake.type

The last server the infected system attempted to establish a secure connection with was:

  • thichgiban.com

TLS Handshake Analysis

Observation

Although TLS traffic is encrypted, handshake metadata can still reveal suspicious destinations and provide useful indicators during malware analysis.


Step 3 – Identify Persistent Communication Through DNS

Repeated DNS queries can indicate persistent communication between malware and attacker-controlled infrastructure.

To identify this behavior, I reviewed DNS-related traffic and looked for repeated domain activity.

Wireshark Filter

dns.cname

The domain that appeared to show repeated DNS queries was:

  • broker.emqx.io

DNS Analysis

Observation

Frequent DNS lookups for the same domain may indicate beaconing behavior or continued attempts to reach external infrastructure.


Step 4 – Identify Post-Infection C2 Traffic

After the initial infection, malware often communicates with a command-and-control server to receive instructions, exfiltrate data, or download additional payloads.

In this lab, I filtered for MQTT traffic to identify possible C2 activity.

Wireshark Filter

mqtt

The IP address associated with MQTT-based communication was:

  • 54.146.113.169

MQTT Traffic Analysis

Observation

The use of MQTT is notable because malware sometimes leverages less commonly monitored protocols to blend in with legitimate traffic and evade detection.


Indicators of Compromise (IoCs)

IP Addresses

  • 104.21.3.175
  • 54.146.113.169

Domains

  • thichgiban.com
  • broker.emqx.io

Protocols Observed

  • HTTPS / TLS
  • DNS
  • MQTT

Key Findings

  • Suspicious HTTPS traffic was identified over port 443
  • TLS handshake analysis revealed a suspicious server name indication
  • Repeated DNS lookups suggested persistent external communication
  • MQTT traffic indicated possible post-infection command-and-control activity

Lessons Learned

This lab reinforced the importance of examining not only packet contents, but also protocol metadata such as TLS SNI fields, DNS behavior, and uncommon protocol usage.

Even when traffic is encrypted, analysts can still uncover meaningful indicators by correlating activity across multiple protocols.


Skills Demonstrated

  • Packet capture analysis
  • Wireshark filtering
  • Threat hunting
  • Network traffic investigation
  • Malware communication analysis
  • Indicator of Compromise identification
  • Protocol analysis across HTTPS, DNS, and MQTT

Author

Jhonatan Martinez

This project was created to demonstrate practical skills in network traffic analysis, malware investigation, and Wireshark-based threat detection.

About

This project documents a network traffic analysis lab focused on identifying unusual behavior and potential Indicators of Compromise (IoCs). I examined packet captures from a compromised system to investigate suspicious communications, identify potentially malicious infrastructure, and trace post-infection command-and-control activity.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors