Tanmay-KS/Malware-Traffic-Forensics
GitHub: Tanmay-KS/Malware-Traffic-Forensics
本项目通过被动流量分析与行为建模,帮助识别恶意软件的C2通信与横向移动行为。
Stars: 0 | Forks: 0
# 🛡️ Malware-Traffic-Forensics
**Repository Description:** > Passive Network Traffic Analysis for Malware Detection using Wireshark & Scapy. A behavioral study on beaconing, port scanning, and anomalous protocol patterns in infected Windows environments.
## 🛡️ Malware Traffic Analysis: A Behavioral Approach
This project focuses on identifying malware activity through **passive network traffic analysis**. By examining PCAP files from infected Windows hosts, we identify compromised systems and command-and-control (C2) communication without ever executing malicious code.
## 🚀 Overview
The analysis adopts a layered approach, combining **protocol-level inspection** (DNS, HTTP, TCP) with **behavioral metrics** like throughput, packet rate, and burstiness to correlate indicators of compromise (IoCs).
## 🛠️ Tools Used
* **Wireshark:** Deep packet inspection and protocol analysis.
* **Scapy (Python):** Statistical modeling and custom graph generation for traffic parameters.
* **Network Statistics:** I/O Graphs, Conversations, and Expert Information logs.
## 🔍 Key Investigative Findings
### 1. The Digital Heartbeat (Beaconing)
Detected rhythmic, low-volume HTTP requests sent at fixed intervals (e.g., every 60s). This automated "phoning home" behavior is a classic hallmark of a C2 implant.
### 2. Reconnaissance & Lateral Movement
* **Port Scanning:** Identified high-speed TCP SYN floods targeting thousands of ports in seconds.
* **SMB/NTLM Brute Force:** Observed a massive spike in `STATUS_LOGON_FAILURE` errors, indicating an attempt to move laterally within the network.
### 3. Payload Staging
Caught unencrypted HTTP file transfers of executable files (`.exe`) on Port 80, signaling the "staging" phase where the primary malware payload is delivered to the host.
### 4. Traffic Flow Anomalies
* **Asymmetric Data Flow:** Significant imbalance where external servers pushed high volumes of data to internal hosts (Payload Delivery).
* **Sleep/Wake Cycles:** Extended periods of inactivity followed by sudden bursts of outbound traffic—an evasion tactic used by advanced threats.
## 📊 Statistical Analysis
Using Scapy, we visualized the "vitals" of the infection:
* **Throughput Spikes:** Identifying bulk data transfers.
* **Packet Size Distribution:** Differentiating between control "chatter" and data "cargo."
* **Burstiness:** Proving automated communication patterns versus human interaction.
## 📂 Project Structure
```
├── analysis_report.md # Full humanized analysis report
├── pcap_evidence/ # Screenshots of Wireshark observations
├── scapy_scripts/ # Python scripts for throughput/packet rate graphs
└── README.md # You are here!
```
标签:Beaconing, C2通信检测, DNS分析, HTTP工具, HTTP流量分析, IoC指标, IP 地址批量处理, NTLM暴力破解, Payload交付, PCAP分析, PE 加载器, Scapy流量分析, SMB协议, TCP协议分析, Windows恶意软件, Wireshark分析, 包速率分析, 协议层级检测, 后渗透, 吞吐量监测, 命令与控制流量, 异常协议模式, 恶意流量分析, 数据包深度解析, 数据统计, 文件传输分析, 无线安全, 横向移动检测, 流量可视化, 突发性检测, 端口扫描, 网络安全审计, 网络流量取证, 网络统计, 被动流量分析, 逆向工具, 防御绕过