Analyst: Mohamed Asmy
Date: 2025-10-15
Tool: Wireshark v4.x
Case File: 2024-10-23-Redline-Stealer.pcap
Source: Malware-Traffic-Analysis.net
- 🧭 Project Overview
- 🎯 Objective
- 🧰 Tools Used
- 📂 Evidence Overview
- 🌐 Traffic Summary
- 🚨 Suspicious Findings
- ⏱️ Timeline Analysis
- 🧩 Indicators of Compromise (IOCs)
- 🧾 Conclusion
- 🛡️ Recommendations
- 🔍 Wireshark Analysis Evidence
- 🖼️ Screenshots & Evidence
- 🎓Learning Outcomes
- 🏁 Project Summary
This project involves analyzing a suspicious network capture (PCAP) to identify potential malicious communication, data exfiltration, or C2 activity.
The analysis uses Wireshark to trace HTTP, DNS, and TCP patterns associated with Redline Stealer malware.
To investigate a suspicious .pcap file and detect indicators of compromise by:
- Identifying unusual or repetitive traffic patterns
- Detecting DNS queries to malicious domains
- Finding POST/GET HTTP requests that transmit data externally
- Correlating the timeline of the malicious session
| Tool | Purpose |
|---|---|
| Wireshark v4.x | Network packet capture analysis |
| Markdown & GitHub | Documentation and reporting |
| File Name | Source | Type | Password | Notes |
|---|---|---|---|---|
2024-10-23-Redline-Stealer.pcap |
Malware-Traffic-Analysis.net | PCAP | infected_20241023 | Contains Redline Stealer traffic |
| Src IP | Dst IP | Protocol | Info | Notes |
|---|---|---|---|---|
| 10.10.23.101 | 188.190.10.10 | HTTP/XML | POST / HTTP/1.1 | Outbound suspicious POST |
| 10.10.23.101 | 10.10.23.1 | DNS | Query for api.ip.sb |
Domain reconnaissance |
| # | Observation | Description |
|---|---|---|
| 1 | Multiple HTTP POST requests | Consistent outbound POSTs from internal host to external IP |
| 2 | Suspicious DNS query | api.ip.sb queried, likely reconnaissance or IP check |
| 3 | XML data transfer | POST payload contained XML content typical of C2 data |
| 4 | Periodic connection attempts | Suggests beaconing behavior |
| Time (s) | Source IP | Destination IP | Event |
|---|---|---|---|
| 0.343 | 10.10.23.101 | 188.190.10.10 | Initial HTTP POST |
| 5.722 | 10.10.23.101 | 188.190.10.10 | Second POST detected |
| 10.292 | 10.10.23.101 | 188.190.10.10 | Large POST payload |
| 18.783 | 10.10.23.101 | 188.190.10.10 | Continued beaconing |
| Type | Value | Description |
|---|---|---|
| IP Address | 188.190.10.10 | Redline Stealer C2 Server |
| Domain | api.ip.sb | Used for host IP reconnaissance |
| Host | 10.10.23.101 | Infected internal workstation |
The analysis confirms that the internal host 10.10.23.101 communicated with a known Redline Stealer C2 server (188.190.10.10).
Multiple HTTP POST requests containing XML data and DNS queries to api.ip.sb indicate data exfiltration and C2 activity.
This confirms a malware infection and potential credential theft.
- Isolate the affected host immediately.
- Block
188.190.10.10andapi.ip.sbat the firewall. - Run a full malware scan and collect endpoint logs.
- Rotate all user credentials on the compromised system.
- Conduct user awareness training about phishing downloads.
| Purpose | Filter Command | Description |
|---|---|---|
| Show all HTTP traffic | http |
Displays all HTTP requests/responses |
| Focus on infected host | ip.addr == 10.10.23.101 |
Filters packets related to compromised device |
| Identify C2 server | ip.addr == 188.190.10.10 |
Tracks malicious outbound traffic |
| Find POST requests | http.request.method == "POST" |
Shows data uploads to external servers |
| DNS activity | dns.qry.name contains "api.ip.sb" |
Detects suspicious DNS queries |
| TCP streams | tcp.stream eq 0 |
Follows a single TCP conversation |
- Open
.pcapin Wireshark - Set Time Reference on first suspicious packet (right-click → “Set Time Reference”)
- Apply each filter above sequentially
- Right-click on a POST request → “Follow → TCP Stream”
- Review payload for stolen credentials or encoded data
| # | Description | Screenshot |
|---|---|---|
| Fig. 1 | DNS query to api.ip.sb |
![]() |
| Fig. 2 | HTTP POST request to C2 server | ![]() |
| Fig. 3 | TCP stream of Redline payload | ![]() |
| Fig. 4 | Full traffic overview timeline | ![]() |
By completing this project, the analyst (Mohamed Asmy) learned to:
- Use Wireshark filters to trace malicious activity
- Identify C2 and exfiltration behavior in PCAP files
- Build a professional incident report
- Correlate DNS, HTTP, and TCP activity in network forensics
- Document findings for cybersecurity investigation reports
Project Name: Network Traffic Analysis with Wireshark
Category: Cybersecurity Forensics / Threat Hunting
Level: Beginner–Intermediate
Duration: ~3–4 hours
Status: ✅ Completed
© 2025 Mohamed Asmy — Cybersecurity Portfolio Project (CCP1)



