Brad

Sharing information on malicious network traffic and malware samples.

2026-02-03 (Tuesday): #GuLoader for #AgentTesla style malware with FTP data exfiltration.

A #pcap of the infection traffic, associated files, and a list of indicators are available at malware-traffic-analysis.net/2

Two online sandboxes tag this sample as AgentTesla, but I'm not sure what the actual name of this malware is.

- tria.ge/260203-tvhlyahx7c
- app.any.run/tasks/0840196f-2b8

Screenshot of my blog post with the files and information from this infection.Screenshot of the email with an attached RAR archive.The malware, extracted from the attached RAR archive.Traffic from the infection filtered in Wireshark.

@netresec Lol, I've been calling this Async RAT ever since I first saw it, and no one reached out to correct me about it until now. Thanks!

@netresec Thanks! When I have time, I'll update the blog post to reflect this info!

NOTE: This has been updated to correct the malware names. Thanks, @netresec!

2026-02-02 (Monday) #KongTuke #ClickFix activity leads to #MintsLoader and #GhostWeaver #RAT

Today, the ClickFix text uses the "finger" command, which is a tactic used by KongTuke and other ClickFix campaigns in previous weeks/months.

A #pcap of the infection traffic, some artifacts, and further details are available at malware-traffic-analysis.net/2

Fake "Verify You Are Human" CAPTCHA page that can appear when viewing a page from a legitimate but compromised website.Text from KongTuke's fake CAPTCHA page injected into the viewer's clipboard, and the CAPTCHA page contains instructions to run the text as a command in Window's Run window.Traffic from the KongTuke activity and resulting infection filtered in Wireshark.

2026-02-01 (Sunday): It's easy enough to find #LummaStealer malware samples.

Just do a Google search for cracked versions of popular software and specify site:drive.google.com.

Details on today's haul at github.com/malware-traffic/ind

Screenshot showing Google search results for a cracked version of ArcGIS where I specify site:drive.google.com. The results shown here all lead to PDF files hosted on Google Drive, and these PDF files contains links that lead to malware.Here's an example of one of these PDF files hosted on Google Drive with a link that leads to malware.Here's the page that pushes a password-protected 7-zip archive that contains an inflated EXE padded with null bytes. This EXE is for Lumma Stealer malware.Lumma Stealer traffic generated by the extracted malware. This is filtered in Wireshark to focus on the Lumma Stealer C2 traffic.

2026-01-31 (Friday): I've posted a new traffic analysis exercise. It's Lumma in the room-ah! Join the fun at malware-traffic-analysis.net/2

I mean, this guy looks like he's having fun.

Let's all have fun like this guy!

2026-01-22 (Thursday): #RemcosRAT infection persistent on an infected Windows host. This was caused by #ClickFix instructions from #SmartApeSG through a fake CAPTCHA page. Details of this #Remcos #RAT infection are available at malware-traffic-analysis.net/2

I've also added three other blog entries from infections I generated in my lab on Tuesday, 2026-01-20. Those can be found at malware-traffic-analysis.net/2

Those three other entries cover #LummaStealer, #VIPRecovery, and #Xworm. The VIP Recovery and Xworm infections followed the same chain of events, which includes #steganography through base64 text embedded in an image.

Screenshot from an infected Windows host showing Remcos RAT and how it is persistent.

2026-01-19 (Monday): Catching up on two infections in my lab from last week, and I added an entry with a #pcap of scans and probes and web traffic hitting my web server.

I attempted to set up MongoDB on my server to detect any "MongoBleed" CVE-2025-14847 activity, but I was unable to configure the server properly.

I opened TCP port 27017 on my Apache web server, and I'm only receiving web scans/probes on that port.

Feel free to check out my latest posts at malware-traffic-analysis.net/2

Or not. I'm not your parent. I can't tell you what to do.

Screenshot of my site's 2026 page with links to my latest blog posts.
Brad boosted:
SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2026-01-14

ISC Diary: Infection repeatedly adds scheduled tasks & increases traffic to same C2 domain isc.sans.edu/diary/32628

@netresec @james_inthe_box I forgot that I saw something identifying VIP Recovery as Snake Keylogger back in September 2024:

malware-traffic-analysis.net/2

But yeah, I don't think it matters much, because it's likely the same thing, whatever we call it.

Post-infection SMTP data exfiltration showing VIP Recovery.Mail server for VIP Recovery data exfiltration showing Snake Keylogger.

2026-01-10 (Saturday): Ten days of scans, probes, and web traffic hitting my web server.

This traffic is often fun to check the URLs in the HTTP requests that would retrieve malicious content, if the exploits in the scans/probes were successful. Can get a bit repetitive, though, because it seems to be mostly for Mirai botnet-type malware.

A #pcap of the traffic is available at malware-traffic-analysis.net/2

Some of the scans, probes, and web traffic from the pcap filtered in Wireshark.HTTP stream of the last HTTP traffic in the pcap, showing a POST request that retrieves malicious content from a server at 91.92.241[.]10.Using the wget command to retrieve one of the malicious files from the server at 91.92.241[.]10 on Sunday, 2026-01-11.Example of a shell script downloaded from 91.92.241[.]10 on Sunday, 2026-01-11, likely for Mirai botnet malware.

2026-01-09 (Friday): #VIPRecovery infection from an email attachment that contains a VBS file.

The infection process involves retrieving an image from Firebase storage. The image contains embedded base64 text that translates to a Windows EXE file.

There's another HTTPS URL that returns reversed base64 text, which translates to another EXE file that appears to be corrupt.

Those EXE files don't do anything interesting individually, and I wasn't able to figure out how everything pulls together for the VIP Recovery infection, but it does somehow.

A #pcap of the infection traffic, associated files, and more information are available at malware-traffic-analysis.net/2

Screenshot of the email, its attachment, and the VBS file within the attachment for VIP Recovery malware.Traffic from the infection filtered in Wireshark.TCP stream of the unencrypted SMTP traffic from one of the data exfiltration emails sent by my infected lab host.Screenshot of the start of my blog post with information on this VIP Recovery infection.

@netresec I assume it is, but I don't know how to confirm. I've seen similar URL patterns before the same type of RAT traffic over TCP port 25658 from KongTuke activity before:

- malware-traffic-analysis.net/2

- malware-traffic-analysis.net/2

2026-01-08 (Thursday): Got a full infection from #KongTuke campaign #ClickFix activity today.

I split the traffic from this infection into two #pcap files, and the second one is over 200 MB, because of the malware download.

Pcap files, the associated malware, artifacts, and further information is available at malware-traffic-analysis.net/2

Fake CAPTCHA window and ClickFix script after visiting a legitimate, but compromised website.Traffic from the infection filtered in Wireshark (part 1 of 2).Traffic from the infection filtered in Wireshark (part 2 of 2).Screenshot from the start of the web page for this blog post.

2026-01-07 (Wednesday): #MassLogger infection from an email attachment.

Copies of the emails, associated malware, a list of indicators, and a #pcap of the infection traffic are available at malware-traffic-analysis.net/2

One of the emails and its associated attachment for MassLogger malware.Traffic from the infection filtered in Wireshark.Example of a data exfiltration email sent from an infected host in my lab.

2026-01-06 (Tuesday): #SmartApeSG CAPTCHA page uses #ClickFix technique to push #RemcosRAT.

The #Remcos #RAT C2 server is at 192.144.56[.]80.

A #pcap of the traffic, the Remcos RAT #malware, and a list of indicators are available at malware-traffic-analysis.net/2

Example of a legitimate but compromised site showing the SmartApeSG fake CAPTCHA page.HTTPS URLs from the infection run.Traffic from an infection filtered in Wireshark.Remcos RAT infection persistent on an infected Windows host.

2026-01-05 (Monday): #KongTuke domain scrroeder[.]com generated #ClickFix script for 144.31.221[.]71, but I didn't get a malware infection when I tried it today.

Injected KongTuke script in page from compromised website.Fake CAPTCHA page from KongTuke domain, scrroeder[.]com.KongTuke's "ClickFix" command injected into the viewer's clipboard.Traffic from the activity filtered in Wireshark. I did not get a malware infection from this.
Brad boosted:
SANS Internet Storm Center - SANS.edu - Go Sentinels!sans_isc@infosec.exchange
2026-01-04

ISC Diary: Cryptocurrency Scam Emails and Web Pages As We Enter 2026 isc.sans.edu/diary/32594

2026-01-01 (Thursday): #LummaStealer infection with follow-up malware.

A #pcap of the infection traffic, the #Lumma #Stealer files, and a list of IOCs are available at malware-traffic-analysis.net/2

Lumma Stealer C2 domain: offenms[.]cyou

The follow-up malware is using memory-scanner[.]cc for its C2 traffic, just like I saw on 2025-12-30. But this follow-up malware also used another C2 domain: communicationfirewall-security[.]cc

A screenshot of my blog post for the Lumma Stealer infectionTraffic from the Lumma Stealer infection filtered in Wireshark.

2025-12-30 (Tuesday): #LummaStealer infection with follow-up malware.

A #pcap of the infection traffic, the associated #Lumma with follow-up #malware samples, and some IOCs are available at www.malware-traffic-analysis.net/2025/12/30/index.html

I don't know what the follow-up malware is, but unlike Lumma Stealer, the follow-up malware was made persistent.

Big thanks to VirusTotal on this, because I was able to grab VirusTotal's CAPE Sandbox analysis of the Lumma Stealer sample, and it shows the URLs from the HTTPS traffic that I can't get in my lab.

If anyone knows what the follow-up malware is, please share that info!

Screenshot of my blog post to share information on this Lumma Stealer infection with follow-up malware.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst