Overview
This page focuses on the MITRE ATT&CK mapping derived from a Wireshark PCAP investigation of a Windows host infection.
The mapping below includes only techniques supported by network-visible evidence (TLS SNI, HTTP streams, and observed connections).
For the full step-by-step traffic analysis (how the infected host was identified, how the staging server was confirmed, and how secondary C2 endpoints were validated),
please refer to the detailed write-up in my GitHub repository.
Key Findings (Summary)
- Infected host: 10.1.17.215 (Windows client)
- Phishing domain: google-authenticator.burleson-appliance[.]net (confirmed via TLS SNI)
- Staging / primary control server: 5.252.153[.]241 (VBScript + PowerShell + PE download over HTTP)
- Secondary C2 endpoints: 45.125.66[.]32:2917 and 45.125.66[.]252:443 (post-infection TLS connections)
Note: This page intentionally keeps the findings brief. The full evidence trail, filters, and packet-level validation are documented in the GitHub write-up.
MITRE ATT&CK Mapping (Evidence-Based)
Scope: This mapping includes only techniques directly supported by network traffic and script contents observed in the PCAP.
- Initial Access
- T1566.002 – Phishing: Spearphishing Link
Evidence: TLS Client Hello SNI to google-authenticator.burleson-appliance.net
Reasoning: Victim accessed a phishing domain impersonating Google Authenticator over HTTPS.
- Execution
- T1059.005 – Command and Scripting Interpreter: Visual Basic
Evidence: HTTP-delivered VBScript (/api/file/get-file/264872) from 5.252.153[.]241
Reasoning: VBScript was used as the initial execution stage.
- T1059.001 – Command and Scripting Interpreter: PowerShell
Evidence: PowerShell launched with -WindowStyle Hidden; second-stage script retrieved from /api/file/get-file/29842.ps1
Reasoning: PowerShell execution and script retrieval are visible in HTTP streams.
- Defense Evasion
- T1027 – Obfuscated/Compressed Files and Information
Evidence: Obfuscated PowerShell content with encoded strings observed in delivered script
Reasoning: Obfuscation is visible in the retrieved payload.
- T1564.003 – Hide Artifacts: Hidden Window
Evidence: PowerShell launched using -WindowStyle Hidden
Reasoning: Execution intentionally hidden from the user.
- Persistence
- T1547.001 – Boot or Logon Autostart Execution: Startup Folder
Evidence: Script creates TeamViewer.lnk pointing to C:\ProgramData\huo\TeamViewer.exe
Reasoning: Persistence mechanism is explicitly defined in the script retrieved over HTTP.
- Command and Control
- T1105 – Ingress Tool Transfer
Evidence: Network delivery of VBScript, PowerShell, and PE executable (PE confirmed by MZ header)
Reasoning: Payloads and tools were transferred directly over HTTP from attacker infrastructure.
- T1071.001 – Application Layer Protocol: Web Protocols
Evidence: HTTP for staging/payload delivery; HTTPS/TLS for post-infection communication
Reasoning: Web protocols were used across multiple stages of the infection chain.
- T1573.002 – Encrypted Channel: TLS
Evidence: Repeated TLS sessions to 45.125.66.32:2917 and 45.125.66.252:443
Reasoning: Encrypted outbound communication consistent with secondary C2 behavior.
Takeaway
This mapping shows how MITRE ATT&CK techniques can be supported using network evidence alone.
For the complete packet-by-packet proof (filters, HTTP streams, and the reasoning used to confirm the secondary C2 endpoints),
see the full write-up in the GitHub repository linked below.