Could someone tell me where to set the filters on to see on what machine is a rootkit ? For example. Customer has 100+ pc's all have antivirus. Now 1 machine has a torpig virus. running wireshark on the server to check packages for 24 hours. Now i would like to filter it to quickly see it. Did tcp.dstport == 80 as filter and http.request.method==POST seeing that the rootkits ask for that. But its still alot to go through. Thanks in advance asked 09 May '12, 07:32 Jotronics |
One Answer:
Hi, trying to detect a trojan, just by looking at the network traffic is hard if you don't know how it behaves (IP addresses it contacts - C&C servers -, what kind of data "pattern" it uses, etc.) Just looking for POST requests for a whole network, won't help you, as there will be loads of regular POST requests from your users (logging in somewhere, etc.). So, what can you do? Luckily, there are a papers available that describ in detail how Tropig works and what servers it tries to contact.
Within one document you'll find a list of possible C&C servers:
I suggest you look for any data directed to those servers in the first place. Display Filter:
HOWEVER: Torpig uses "Domain/DNS flux", so the servers above might have changed and you won't see any traffic. Basically, this is just something to get you started and I hope it gave you an idea how to continue. Regards answered 09 May '12, 11:31 Kurt Knochner ♦ edited 09 May '12, 12:05 |
Kurt thank you for your information. This was the key to finding the 1 pc in 1000 ;)
Sorting the data on IP# and scrolling quickly through all the data you suddenly see all strange domainnames with the same ip#
That was the new updated torpig rootkit. Removed the pc from the network for deeper analysis.
Examples of new domain names : tkdut.com xctwniban.com zoxini.com lqtmd.com kjehip.com biraxwdqd.com
Shame cannot attach a picture to it so other ppl with the same question could see an example.
-Milo
You might want to accept Kurts answer if it helped you ;-)
Congrats, you developed yourself a good way to detect "domain flux" malware. Filter on 'dns.request' and sort for the source IP. If there are clients that resolves "strange" names, that could be a trojan. You could post the picture on flickr.