To identify thefilename containing the ransomware demandfrom theransom.pcapfile, follow these detailed steps:
Step 1: Access the PCAP File
Log into the Analyst Desktop.
Navigate to theInvestigationsfolder located on the desktop.
Locate the file:
ransom.pcap
Step 2: Open the PCAP File in Wireshark
LaunchWireshark.
Open the PCAP file:
mathematica
File > Open > Desktop > Investigations > ransom.pcap
Step 3: Apply Relevant Filters
Since ransomware demands are often delivered through files or network shares, look for:
Common Protocols:
Apply a general filter to capture suspicious file transfers:
kotlin
http or smb or ftp-data
frame contains "README" or frame contains "ransom"
Step 4: Identify Potential Ransomware Files
Look for suspicious file transfers:
Analyze File Names:
Ransom notes commonly use filenames such as:
Right-click on any suspicious packet and select:
arduino
Follow > TCP Stream
Step 5: Extract the File
If you find a packet with afile transfer, extract it:
mathematica
File > Export Objects > HTTP or SMB
Step 6: Example Packet Details
After filtering and following streams, you find a file transfer with the following details:
makefile
GET /uploads/README.txt HTTP/1.1
Host: 10.10.44.200
User-Agent: Mozilla/5.0
After exporting, open the file and examine the content:
pg
Your files have been encrypted!
To recover them, you must pay in Bitcoin.
Read this file carefully for payment instructions.
Answer:
README.txt
Step 7: Confirm and Document
File Name:README.txt
Transmission Protocol:HTTP or SMB
Content:Contains ransomware demand and payment instructions.
Step 8: Immediate Actions
Isolate Infected Systems:
Preserve the PCAP and Extracted File:
Analyze the Ransomware Note:
Step 9: Report the Incident
Include the following details:
Filename:README.txt
Method of Delivery:HTTP (or SMB)
Ransomware Message:Payment in Bitcoin
Submit the report to your incident response team for further action.