Description
- Probable Name: This is an access to a Phising site of a known bank.
- The infection was done by accessing the site www.cafecaterers.com/x/
- Duration: 3.2hs
Files
- .capinfos
- .dnstop
- mitm.out
- Mitm proxy interception file of http and https
- .mitm.weblog
- This is the HTTP and HTTPS web log that includes Labels. This is the preferred file for web analysis.
- This file includes a header with the columns names. There are two new columns defined by us:
- Column id: This number is unique for all the weblogs generated inside the same TCP connection. When a TCP connection is opened and several GET/POST, etc., requests are made inside it, all of them are assigned the same Id in this file.
- Column timestamp_end: This is the timestamp when the weblog ended. If you use this with the id column you can compute the total duration of the TCP connection that generated all the weblogs. Similar to the duration of a hypothetical CONNECT request if this would have been done using a proxy.
- .passivedns
- .pcap
- .rrd
- .weblogng
- WEB log of http traffic only. Generated with justsniffer
- .exe.zip
- bro
- Folder with all the bro output files
- .biargus
- Argus binary file. Bidirectional flows, 3600s of report time.
- .binetflow
- Argus text file with bidirectional flows. Report time 3600 secs.
- .uniargus
- Argus binary file. Unidirectional flows, 5s of report time.
- .uninetflow
- Argus text file with unidirectional flows. Report time 5 secs. TAB as column separator.
IP Addresses
- Infected host: 10.0.2.102
Timeline
Wed Feb 25 10:24:53 CET 2015
started win2
Wed Feb 25 10:25:51 CET 2015
I received a phising email for the fio banka. This is new so it is working. The mail had only one link: http://www.cafecaterers.com/x/
Some page was downloaded
The site www.cafecaterers.com in VirusTotal has two known URLs detected as phising sites. Its IP address is 192.185.52.247 which in VirusTotal is repoted to have been used for several hundreds phising URLs.
The content of www.cafecaterers.com redirects the browser to the URL materlab.eu, which in VirusTotal is detected as having at least 15 malware and phising sites. This website resolves to the IP address 192.185.99.155 which also has several dozen detections.
Wed Feb 25 10:30:32 CET 2015
tried to login with name: pavel heslo: pavel2014
They asked for a sms code
Wed Feb 25 10:31:33 CET 2015
i put sms kdwo3
They 'logged me' into some 'fake bank'.
Wed Feb 25 11:44:33 CET 2015
i started clicking some buttons
Wed Feb 25 13:42:04 CET 2015
power off win2
Disclaimer
These files were generated in the Stratosphere Lab as part of the Malware Capture Facility Project in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real botnet traffic and to generate labeled netflows files. Any question feel free to contact us: Sebastian Garcia: sebastian.garcia@agents.fel.cvut.cz
You are free to use these files as long as you reference this project and the authors as follows: Garcia, Sebastian. Malware Capture Facility Project. Retrieved from https://stratosphereips.org