PCAP Analysis Using tshark For Some Malware

Dabbling with light malware analysis. Starting with investigating the PCAP file

1/2/20262 min read

X

Sample source

This PCAP was downloaded from:

https://www.malware-traffic-analysis.net/

Exercise: Traffic Analysis Exercise – 2025-06-13


Purpose of this lab

The purpose of this lab is to understand how tshark works.


Step 1 — Understand the evidence

ls -lah

Why: establish file size, timestamps, and scope of the capture.


Step 2 — Preserve evidence identity

sha256sum *.pcap | tee hashes.txt

Why: create a reproducible fingerprint of the evidence.


Step 3 — Identify likely infected host

tshark -r *.pcap -T fields -e ip.src | sort | uniq -c | sort -nr | head

Why: infected hosts tend to generate disproportionate traffic.


Step 4 — Confirm central host

tshark -r *.pcap -T fields -e ip.dst | sort | uniq -c | sort -nr | head

Why: a true victim appears frequently as both source and destination.


Step 5 — DNS review

tshark -r *.pcap -Y "dns.qry.name" -T fields -e frame.time -e ip.src -e dns.qry.name

Why: DNS often reveals malicious infrastructure or confirms its absence.


Step 6 — Pivot on suspicious external IP

tshark -r *.pcap -Y "ip.addr == <SUSPICIOUS_IP>" -T fields -e frame.time -e ip.src -e ip.dst -e tcp.dstport -e udp.dstport

Why: ip.addr matches traffic in either direction, simplifying pivots.


Key takeaways

  • Start with statistics, not payloads
  • Absence of DNS signal can still be meaningful
  • ip.addr enables fast bidirectional analysis
  • Traffic shape alone can indicate beaconing

Related posts

Keep reading