
EvilExtractor Network Forensics
Erik Hjelmvik | | 1-Password-Cookies, 193.42.33.232, 2-Credentials, 3-Files, 89.116.53.55, ANY.RUN, EvilExtractor, FTP, KK2023.zip, NetworkMiner, sandbox, tria.ge, Triage
I analyzed a PCAP file from a sandbox execution of the Evil Extractor stealer malware earlier today. This stealer collects credentials and files of interest from the victim's computer and exfiltrates them to an FTP server. It is designed to autonomously collect and exfiltrate data rather than receiv[...] ... Read More

TLS Redirection and Dynamic Decryption Bypass in PolarProxy
Erik Hjelmvik | | ascii-art, bypass, bypassonfail, Domain Fronting, Fail Open, PolarProxy, redirect, SNI, TLS
PolarProxy is constantly being updated with new features, enhanced performance and bug fixes, but these updates are not always communicated other than as a short mention in the ChangeLog. I would therefore like to highlight a few recent additions to PolarProxy in this blog post. Custom TLS Redirecti[...] ... Read More
How to Identify IcedID Network Traffic
Erik Hjelmvik | | a0e9f5d64349fb13191bc781f81f42e1, b523e3d33e7795de49268ce7744d7414aa37d1db, beacon, CapLoader, ec74a5c51106f0419184d0dd08fb05bc, GzipLoader, IcedID, Periodic connections, periodicity, video
Brad Duncan published IcedID (Bokbot) from fake Microsoft Teams page earlier this week. In this video I take a closer look at the PCAP file in that blog post. The video cannot be played in your browser. Note: This video was recorded in a Windows Sandbox to minimize the risk ... Read More

CapLoader 1.9.5 Alerts on Malicious Traffic
Erik Hjelmvik | | Alerts, CapLoader, Kovter, njrat, Port-protocol mismatch, Threat Hunting, video, VLAN
CapLoader 1.9.5 was released today! The most important addition in the 1.9.5 release is the new Alerts tab, in which CapLoader warns about malicious network traffic such as command-and-control protocols. The alerts tab also shows information about network anomalies that often are related to maliciou[...] ... Read More

Online Network Forensics Class
I will be teaching two live online network forensics classes this spring, one in March and one in April. The March class is adapted to American time and the April one is adapted to European time. Both classes focus on doing network forensics in an incident response context. The training ... Read More

NetworkMiner 2.8 Released
I am happy to announce the release of NetworkMiner 2.8 today! This new version comes with an improved user interface, better parsing of IEC-104 traffic and decapsulation of CAPWAP traffic. The professional edition of NetworkMiner additionally adds port-independent detection of SMTP and SOCKS traffic[...] ... Read More

What is PCAP over IP?
Erik Hjelmvik | | Arkime, ncat, netcat, NetworkMiner, Packetbeat, pcap, PCAP-over-IP, PolarProxy, Suricata, tcpdump, tcpreplay, tshark, Wireshark, Zeek
PCAP-over-IP is a method for reading a PCAP stream, which contains captured network traffic, through a TCP socket instead of reading the packets from a PCAP file. A simple way to create a PCAP-over-IP server is to simply read a PCAP file into a netcat listener, like this: nc -l ... Read More

CapLoader 1.9.4 Released
Erik Hjelmvik | | CapLoader, JA3, JA3S, pcap, Protocol Detection, Protocol Identification, SPID, TLS, VXLAN
A new version of our advanced PCAP filtering tool CapLoader was released today. The new CapLoader 1.9.4 release includes features like JA3 hash extraction from TLS traffic and a fantastic thing called Select Similar Flows, which is a unique feature that you will only find in CapLoader! We have also[...] ... Read More

Real-time PCAP-over-IP in Wireshark
Did you know that it is possible to stream captured packets from a remote device or application to Wireshark in real-time using PCAP-over-IP? This blog post explains how you can configure Wireshark to read decrypted TLS packets directly from PolarProxy over a TCP socket. PolarProxyPolarProxy is a TL[...] ... Read More

Emotet C2 and Spam Traffic Video
Erik Hjelmvik | | 37cdab6ff1bd1c195bacb776c5213bf2, 51c64c77e60f3980eea90869b68c58a8, C2, Command And Control, ec74a5c51106f0419184d0dd08fb05bc, Emotet, fd4bc6cea4877646ccd62f0792ec0b62, JA3, JA3S, pcap, smtp, SMTPS, Spam, spambot, STARTTLS, video, videotutorial, Windows Sandbox
This video covers a life cycle of an Emotet infection, including initial infection, command-and-control traffic, and spambot activity sending emails with malicious spreadsheet attachments to infect new victims. The video cannot be played in your browser. The video was recorded in a Windows Sandbox i[...] ... Read More