Link to home
Start Free TrialLog in
Avatar of Nobuo Miwa
Nobuo Miwa

asked on

T-Pot : how to determine src IP of caught binaries

Hello,

I am trying to catch malware using T-Pot.
I caught some malware in /data/dionaea/binaries, but I don't know which IP did they come from.

Please let me know how to determine src ip of each malware(file name is MD5 hash).

regards,
Nobuo Miwa
Avatar of arnold
arnold
Flag of United States of America image

Commonly, a log should exist that identifies the binary and its source.

If this is what you deployed, http://dtag-dev-sec.github.io/mediator/feature/2015/03/17/concept.html
/data/EWS

Seems to be the log location.

Not sure whether detection/reporting is configurable ......
Avatar of Nobuo Miwa
Nobuo Miwa

ASKER

Thanks arnold,

But I could not find out detecting src ip from binary filename(MD5).
ASKER CERTIFIED SOLUTION
Avatar of arnold
arnold
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Hello arnold,

Thank you for the hints.

I got src ip from sqlite log like following SQL..

select connections.connection_timestamp,connections.remote_host,connections.local_port,downloads.download_md5_hash from connections,downloads where connections.connection=downloads.connection and connections.local_port='445';

This case should be closed.