Description of Scenario CTU-Malware-Capture-Botnet-31

Timeline
Tue Nov 26 10:23:03 CET 2013
win10 is powered on again. The computer is started already infected. Pcap file: 2013-11-25capture-win10-2.pcap
Fri Dec 6 10:53:06 CET 2013
The linux host was frozen so the capture was stopped.
Analysis of the Traffic
Infected Machines:
- Windows XP Name: WIN10, IP: 10.0.2.110
Labels assigned to the DNS tuples
- 10.0.2.110-8.8.4.4-53-udp (From-Botnet-UDP-DNS--2203)
- 10.0.2.110-8.8.8.8-53-udp (From-Botnet-UDP-DNS--2204)
DGA
The DGA in this malware is somehow hidden. Instead of using the default DNS servers configured in the computer the malware uses its own DNS servers. Moreover, the DNS requests are sent using the TCP protocol, so is highly suspicious. An example of the DNS requests are:
- jusxreer.cc
- jloundwop.cc
- jiatrwqjly.cc
- gcrdumnh.cc
- lfikrlkonpg.cc
- gkftgujt.cc
- mxxywhxoc.cc
- dyybbsux.cc
- jmexlakjdk.cc
- kuhfkadnmaxr.cc
- saxtostfsa.cc
- qudjmojvow.cc
- tqqpteoxlcih.cc
- dhkyhfk.cc
- zlwqpfaav.cc
- hegnriulvcuz.cc
- llmqfpcytxs.cc
- zroinxiijpc.cc
- qazbaanr.cc
- qazbaanr.cc
- qfjcwnp.cc
- cmpzygrl.cc
- cmpzygrl.cc
- juexzkgj.cc
- ioftsmxnkg.cc
- qnpkcfpamzd.cc
- rsefpkktbwch.cc
- imrxesxj.cc
- pikpbckzrc.cc
- gkrpwabree.cc
- gkrpwabree.cc
- oshziujp.cc
- wyfrgexx.cc
- tlkibrweh.cc
- andqkpj.cc
- andqkpj.cc
- sallskvz.cc
- jpeehfaexnw.cc
- bfsazhkgpxy.cc
An example of the DNS servers used are:
- 192.12.94.30
- 192.26.92.30
- 192.31.80.30