Overview

This investigation analyzes suspicious network traffic detected by Suricata IDS.
The alert indicated possible command-and-control communication associated with the Koi Stealer malware family.

Tools Used

  • Suricata IDS
  • Wireshark
  • PCAP traffic analysis

Detection

Suricata generated the following alert:

ET MALWARE Win32/Koi Stealer CnC Checkin

Traffic Analysis

Wireshark inspection revealed an HTTP request from the internal host:

172.17.0.99 → 79.124.78.197

Observed request:

GET /index.php?id=&subid=qI0uKk7U

Indicators of Compromise

IndicatorValue
Infected Host172.17.0.99
C2 Server79.124.78.197
ProtocolHTTP
MalwareKoi Stealer

Conclusion

The investigation confirms outbound C2 communication consistent with Koi Stealer malware behavior.


Full Technical Investigation

View full investigation on GitHub

Scroll to Top