The PCAP files with the analyzed network traffic can be downloaded from malware-traffic-analysis.net.
CyberChef recipe to decode the reverse shell traffic to 103.27.157.146:4444:
Decoded data from first “key007” reverse shell session to 103.27.157.146:4444:
Group name Domain Computers
Comment All workstations and servers joined to the domain
Members
——-——–——-——–——-—————-———-——–——–
DESKTOP-G71S4PF$
The command completed successfully.
CyberChef recipe to decode obfuscated PowerShell payload from malicious finger service on 64.190.113.206:79:
IOC List
Network Forensics Training
Check out our network forensic trainings if you want to learn more about decoding malware C2 traffic.
We have a Network Forensics for Incident Response class on February 23-26.
Disney has reportedly tempered expectations for Star Wars: The Mandalorian and Grogu, which is currently…
Surprise! Seven years after it launched — and almost six months after its sequel was…
The post CPI Media Deploys QuickLink StudioCall appeared first on TV News Check.
The post Sports Streamer DAZN Makes $100 Million Bet On Technology Company ViewLift appeared first…
Harmonic will showcase an AI-powered network operations intelligence platform, new remote OLT hardware and a…
Jacksonville State University has overhauled its athletics broadcast communications with a Dante-based system from Studio…
This website uses cookies.