Ca v10 Skills Assessment 1
Ca v10 Skills Assessment 1
Content for this assessment was obtained from http://www.malware-traffic-analysis.net/ and is used with
permission. We are grateful for the use of this material.
Required Resources
Host computer with at least 8GB of RAM and 45GB of free disk space
Latest version of Oracle VirtualBox
Security Onion virtual machine requires 4GB of RAM using 25GB disk space
Internet access
Instructions
a. Identify time frame of the Pushdo trojan attack, including the date and approximate time.
2017-06-27 from 13:38:34 to 13:44:32
b. List the alerts noted during this time frame associated with the trojan.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 5 www.netacad.com
Internal IP address:
192.168.1.96
External IP addresses:
143.95.151.192
119.28.70.207
145.131.10.21
62.210.140.158
119.28.70.207
208.67.222.222
208.83.223.34
198.1.85.250
a. Based on the alerts, what is the IP and MAC addresses of the infected computer? Based on the MAC
address, what is the vendor of the NIC chipset? (Hint: NetworkMiner or internet search)
IP: 192.168.1.96
MAC: 00-15-C5-DE-C7-3B
NIC Vendor: Dell Inc.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 5 www.netacad.com
b. Based on the alerts, when (date and time in UTC) and how was the PC infected? (Hint: Enter the
command date in the terminal to determine the time zone for the displayed time)
How did the malware infect the PC? Use an internet search as necessary.
a. Based on the alerts associated with HTTP GET request, what files were downloaded? List the malicious
domains observed and the files downloaded.
gerv.gun – matied.com/gerv.gun
trow.exe – lounge-haarstudio.nl/oud/trow.exe
wp.exe – vantagepointtechnologies.com/wp.exe
Use any available tools in Security Onion VM, determine and record the SHA256 hash for the
downloaded files that probably infected the computer?
gerv.gun = 0931537889c35226d00ed26962ecacb140521394279eb2ade7e9d2afcf1a7272
trow.exe = 94a0a09ee6a21526ac34d41eabf4ba603e9a30c26e6a1dc072ff45749dfb1fe1
wp.exe = 79d503165d32176842fe386d96c04fb70f6ce1c8a485837957849297e625ea48
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 5 www.netacad.com
b. Navigate to www.virustotal.com input the SHA256 hash to determine if these were detected as malicious
files. Record your findings, such as file type and size, other names, and target machine. You can also
include any information that is provided by the community posted in VirusTotal.
gerv.gun:
58 engines detected this file
File type: Win32 EXE
File size: 236.00 KB (241664 bytes)
Names:
gerv.gun
test
tmp523799.697
tmp246975.343
tmp213582.420
extract-1498570714.111294-HTTP-FG0jno3bJLiIzR4hrh.exe
0931537889c35226d00ed26962ecacb140521394279eb2ade7e9d2afcf1a7272.bin
vector.tui
Target Machine: Intel 386 or later processors and compatible processors
trow.exe:
63 engines detected this file
File type: Win32 EXE
File size: 323.00 KB (330752 bytes)
Names:
Pedals
Pedals.exe
trow.exe
test3
2017-06-28_18-18-14.exe
bma2beo4.exe
Target Machine: Intel 386 or later processors and compatible processors
wp.exe:
55 engines detected this file
File type: Win32 EXE
File size: 300.50 KB (307712 bytes)
Names:
wp.exe
test2
test_3
4da48f6423d5f7d75de281a674c2e620.virobj
wp.exe.x-msdownload
Target Machine: Intel 386 or later processors and compatible processors
c. Examine other alerts associated with the infected host during this timeframe and record your findings
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 5 www.netacad.com
End of document
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 5 www.netacad.com