Skip to content

Latest commit

 

History

History
49 lines (25 loc) · 2.64 KB

rita_html.md

File metadata and controls

49 lines (25 loc) · 2.64 KB

RITA

In this lab we are going to look at detecting command and control traffic on a network.

We will be using Real Intelligence Threat Analytics (RITA) for this lab.

To start we first need to open Windows File Explorer and navigate to the tools directory.

First, open File Explorer and navigate to the /opt/rita-html-report directory. To do this, select + Other Locations when the Ubuntu File Explorer opens

Then, select index.html:

Let’s select VSAGENT-2017-3-15.

Review Options

The tabs across the top allow you to review the output for all the different analysis modules of RITA. For VSAgent we will be focusing on Beacons, Blacklisted and User Agents.

Please select Beacons now.

Beacons

Some backdoors have a very strong “heartbeat”. This is where a backdoor will constantly reconnect to get commands from an attacker at a specific interval. The interval consistency of the “heartbeat” is the TS score where a value of 1 is perfect. The top value in this set is the VSAgent communication. We will talk about the other connections in a few moments.

We also have the number of connections. While some beacons have a “strong” heartbeat, they are very short in nature. Our VSAgent connection had a very large number of connections which had very strong intervals, while some of the others (e.g. the 64.4.54.253 addresses) had a strong heartbeat, but not as many connections. We will also talk about TS Duration. This is detecting how consistent each connection duration is. For example, if every connection is 2 seconds and there are 8000+ it would have a very strong TS Duration score.

The other fields are statistical analysis fields showing things like mode range and skew. DNSCat2

Now, select RITA and then select DNSCat-2017-03-21. We are going to review a backdoor which does not quite fit the same mold as VSAgent.

This does not beacon back to a specific IP address, but rather it beacons through a DNS server. It is very crafty and will highlight how we can review the RAR compressed Bro logs used to generate the RITA data.

For this one, we are going to jump right to the DNS tab. It gives us the clearest look at this backdoor.

A couple of things should jump out at an investigator straight away. First, there were over 40K requests for cat.nanobotninjas.com. This is an absurd number for a specific domain. Sure, there are lots of requests for com and org and net and uk, but that is to be expected.