Friendly Package

A junior sensor admin was reading through the Zeek Package Source and came across this package. The package is named "friendly package" but is everything but friendly.

The junior admin loaded the package on her zeek sensor on 31 Aug 2020.

At 1598890299 the zeek sensor beaconed to a malicious command and control domain with sensitive host information.

The flag is the domain name which was beaconed to.

./
β”œβ”€β”€ COPYING
β”œβ”€β”€ LICENSE
β”œβ”€β”€ README.md
β”œβ”€β”€ VERSION
β”œβ”€β”€ scripts
β”‚Β Β  β”œβ”€β”€ __load__.zeek
β”‚Β Β  └── innocuous.zeek
β”œβ”€β”€ src
β”‚Β Β  β”œβ”€β”€ Plugin.cc
β”‚Β Β  β”œβ”€β”€ Plugin.h
β”‚Β Β  └── events.bif
β”œβ”€β”€ tests
β”‚Β Β  └── test.sh
└── zkg.meta

All the interesting things happen in the scripts

Yikes that formatting lets clean that up. Trying to hide beyond the column character limit, nice try.

Looks like we have more base64 files to expand out and write.

So we are looking for something that will beacon out. Sounds like an http post to me.

We have our POST. But it is dynamically creating the url based on the time of day. Remember the hint. It happened at 1598890299. So lets back into that domain name

Last updated

Was this helpful?