Overview

Goal: Identify the infected host, confirm malicious payload delivery, analyze encrypted follow-on communications, and extract actionable indicators of compromise from a public malware PCAP.

Environment: Windows 10 virtual machine (VirtualBox) for packet analysis, Kali Linux virtual machine for secure file hashing, Wireshark for traffic inspection, and sha256sum for payload verification.

Data/Evidence: 2025-06-20-traffic-from-running-the-malware.pcap (Malware-Traffic-Analysis dataset)


Scenario

A packet capture was analyzed to investigate suspected malware activity originating from an internal host. The objective was to determine whether malicious payload delivery occurred, identify potential command-and-control (C2) behavior, and assess the scope of impact within the network. The analysis focused on outbound HTTP and TLS communications to suspicious external infrastructure. Findings were documented using a structured SOC investigation approach.


Investigation Methodology

  1. Identified the primary external IP address communicating with the internal network.
  2. Filtered HTTP traffic to determine whether binary payload retrieval occurred.
  3. Correlated TLS Client Hello messages to identify encrypted outbound communications and SNI values.
  4. Determined whether additional internal hosts were communicating with the malicious infrastructure.
  5. Extracted and handled the downloaded payload for validation and hashing in a controlled environment.

Evidence

HTTP GET request for /shrk.bin and corresponding 200 OK response confirming successful binary payload delivery to 172.16.1.128. HTTP GET

Repeated TLS Client Hello sessions from 172.16.1.128 to b1.encountergulf.world, indicating automated encrypted outbound communication consistent with beaconing behavior. TLS Beaconing

Filtered view of all traffic involving 104.21.21.29, confirming that 172.16.1.128 is the only internal system communicating with the malicious infrastructure within the capture scope. IP Filter View


Findings


Indicators of Compromise (IOCs)

Internal Host:

External IP Address:

Domains:

File Path:

Follow-up Payload (shrk.bin):


What I Would Do Next

  1. Submit the extracted file hash to VirusTotal and internal threat intelligence platforms to identify malware family and related infrastructure.
  2. Deploy detection rules to monitor for outbound TLS connections containing SNI b1.encountergulf.world and block associated domains/IP addresses at the perimeter.
  3. Perform host-level forensic analysis on 172.16.1.128 to identify persistence mechanisms and additional artifacts.
  4. Review proxy and firewall logs for similar traffic patterns across the enterprise.

Key Takeaway

Effective network traffic analysis requires correlating payload delivery, encrypted follow-on communications, and scope validation to confidently assess compromise and provide actionable defensive recommendations.