Briana, an employee at Transgear Corp, clicked a malicious link from a phishing email promising Amazon gift cards. The link delivered a stealer malware that silently harvested credentials, system information, and session data — exfiltrating everything via SMTP to an attacker-controlled inbox. This lab involves analyzing the PCAP to reconstruct the attack chain, identify the C2 infrastructure, and recover the stolen data.
Opening the PCAP in Wireshark and checking Statistics → Conversations immediately surfaces a large volume of traffic between Briana’s endpoint and an external IP:
192[.]168[.]1[.]2745[.]56[.]99[.]101 (port 80)The volume and pattern of connections to this external host confirms C2 activity — the malware beaconing out and transmitting harvested data.

Following the HTTP stream reveals the malware’s initial system survey transmitted to the attacker. The beacon contains a full fingerprint of Briana’s workstation:

Time: 01/05/2023 22:51:26
User Name: windows11user
Computer Name: DESKTOP-WIN11PC
OSFullName: Microsoft Windows 11 Pro
CPU: Intel(R) Core(TM) i5-13600K CPU @ 5.10GHz
RAM: 32165.83 MB
IP Address: 173.66.46.112
First contact with the malicious website occurred at 22:51:00.243743.
The stealer harvested saved credentials from Briana’s browsers and mail client, then exfiltrated them via SMTP to:
zaritkt[at]arhitektondizajn[.]com
Credentials recovered from the email data stream include accounts across multiple platforms — Thunderbird, Edge Chromium, LinkedIn, Amazon, Coca-Cola, Target, and NYT. The malware captured username/password pairs for every stored credential.
Notable stolen credentials:
| Platform | Username | Password |
|---|---|---|
| IMAP/SMTP | admin@windows11users[.]com |
EBj%U7-p@q4NW |
admin@windows11users[.]com |
TqQPvG#0g%$ga_q51 |
|
| Amazon | admin@windows11users[.]com |
3Fo76#PTf4P$Im!9mkLso69e=T |
| Coca-Cola | admin@windows11users[.]com |
Zp61-7$r#J_iLpCYV&jKr |
Filtering for SMTP traffic reveals the attacker authenticating to webhostbox[.]net to send the exfiltrated data. The AUTH LOGIN exchange contains Base64-encoded credentials:
AUTH login bWFya2V0aW5nQHRyYW5zZ2Vhci5pbg==
334 UGFzc3dvcmQ6
TUBzc3cwcmQjNjIx
235 Authentication succeeded
Decoding:
The attacker authenticated using internal Transgear Corp credentials — indicating the compromised account marketing@transgear.in was used as the sending relay, likely harvested from Briana’s mail client.
| Type | Value |
|---|---|
| Victim IP | 192[.]168[.]1[.]27 |
| C2 IP | 45[.]56[.]99[.]101 |
| Attacker Email | zaritkt[at]arhitektondizajn[.]com |
| Compromised Account | marketing[at]transgear[.]in |
| Victim Machine | DESKTOP-WIN11PC |
| Victim MAC | bc:ea:fa:22:74:fb |