Scenario: Investigate network activity across four PCAP files to identify data exfiltration, malware infrastructure, and attacker techniques.
Skills Practiced:
Tools Used:
Platform: Security Blue Team (BTL1 Certification Preparation)
Category: Network Security Monitoring - Foundational Skills
Lab Focus: Multi-PCAP investigation, data exfiltration analysis, threat intelligence
Completion Date: February 13, 2026
Score: 27/27 points
Tags: Wireshark SSH OSINT ATTACK BTL1
What remote IP address was used to transfer data over SSH? (Format: X.X.X.X)
Analysis:
Applied SSH filter in Wireshark to identify encrypted data transfer sessions.
Methodology:
tcp.port == 22
Answer: 35.211.33.16
How much data was transferred in total? (Format: XXXX M)
Analysis:
Used Wireshark’s Statistics feature to calculate total SSH data transfer.
Methodology:

Calculation:
Tx Bytes: 8211 k
Rx Bytes: 1123 M
Total: ~1131 M
Answer: 1131 M
Review the IPs the infected system has communicated with. Perform OSINT searches to identify the malware family tied to this infrastructure (Format: MalwareName)
Analysis:
Identified remote IPs in PCAP Two and conducted VirusTotal research for historical attribution.
Methodology:
Key IP Investigated: 31.184.253.165
VirusTotal Findings:

Answer: Trickbot
Review the two IPs that are communicating on an unusual port. What are the two ASN numbers these IPs belong to? (Format: ASN, ASN)
Analysis:
Identified non-standard port communications and performed ASN lookups.
Methodology:
IP 1: 194.233.171.171
IP 2: 104.236.57.24

Answer: 63949, 14061
Perform OSINT checks. What malware category have these IPs been attributed to historically? (Format: MalwareType)
Analysis:
Conducted deeper VirusTotal analysis on identified IPs.
IP: 104.236.57.24 - VirusTotal Results:

Conclusion: Infrastructure historically associated with cryptomining operations.
Answer: Miner
What ATT&CK technique is most closely related to this activity? (Format: TXXXX)
Analysis:
Mapped observed cryptomining behavior to MITRE ATT&CK framework.
Observed Behavior:
MITRE ATT&CK Research:
Technique: T1496 - Resource Hijacking
Description:
“Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability.”

Answer: T1496
Go to View > Time Display Format > Seconds Since Beginning of Capture. How long into the capture was the first TXT record query made? (Format: X.xxxxxx)
Analysis:
Configured Wireshark time display and located first DNS TXT query.
Methodology:
dns.qry.type == 16 (TXT records)First TXT Query:
Time: 2.047649 seconds
Frame: 875
Query: mlckdhokhvhtcmevvcqbggcviwxqim.sandbox.alphasoc.xyz

Answer: 8.527712
Go to View > Time Display Format > UTC Date and Time of Day. What is the date and timestamp? (Format: YYYY-MM-DD HH:MM:SS)
Analysis:
Changed time display format to UTC and captured absolute timestamp.
Methodology:

Answer: 2024-05-24 10:08:50
What is the ATT&CK subtechnique relating to this activity? (Format: TXXXX.xxx)
Analysis:
Identified DNS TXT record usage as a C2 channel and mapped to specific subtechnique.
Observed Behavior:
MITRE ATT&CK Research:
Subtechnique: T1071.004 - Application Layer Protocol: DNS
Description:
“Adversaries may communicate using the Domain Name System (DNS) application layer protocol to avoid detection/network filtering by blending in with existing traffic.”

Answer: T1071.004
Final Results:

| Technique ID | Technique Name | Observed Evidence |
|---|---|---|
| T1071.004 | Application Layer Protocol: DNS | DNS TXT queries for C2 communication |
| T1496 | Resource Hijacking | Cryptomining infrastructure and miner attribution |
| T1041 | Exfiltration Over C2 Channel | SSH data transfer to remote IP |
| T1071.001 | Application Layer Protocol: Web Protocols | HTTP/HTTPS traffic to mining pools |
PCAP Analysis:
Threat Intelligence:
Framework Application:
Detection Opportunities:
Investigation Workflow:
Lessons Learned:
IOCs Identified:
| Indicator Type | Value | Context |
|---|---|---|
| IPv4 | 35.211.33.16 | SSH data exfiltration destination |
| IPv4 | 31.184.253.165 | Pony malware C2 infrastructure |
| IPv4 | 194.233.171.171 | Mining infrastructure (AS 63949) |
| IPv4 | 104.236.57.24 | Mining infrastructure (AS 14061 - Miner tagged) |
| Domain | mlckdhokhvhtcmevvcqbggcviwxqim.sandbox.alphasoc.xyz | DNS TXT C2 query |
| Port | 22 (SSH) | Data exfiltration channel |
| Port | 8080 | Unusual port communication |
| Data Volume | 1131 M | Total SSH transfer volume |
| Malware Family | Trickbot | Stealer/information theft malware |
Timeline:
2024-05-24 10:08:50 UTC - First DNS TXT query (8.527712s into capture)```