Youssef Moukadem

Cybersecurity Enthusiast | Computer Science Graduate | Cloud Enthusiast | Lifelong Learner

View on GitHub

📝 Case Study: ItsyBitsy Malware Investigation

🔹 Overview

During SOC monitoring, an IDS alert indicated potential C2 communication from Browne (HR). A suspicious file contained a malicious pattern THM:{ ________ }. A week of HTTP connection logs were ingested into the connection_logs index in Kibana.

Skills demonstrated:


🔍 Key Findings

1. Events Overview

2. Suspected User IP

3. Download Tool

BITSAdmin is a command-line tool for download/upload tasks.

4. C2 Server

5. Full C2 URL

6. Accessed File

7. Secret Code


Reflection

I gained hands-on experience in threat hunting through this Kibana-based exercise. By analyzing logs and investigating security incidents, I developed skills in examining data points and proxy logs, directly applicable to real-world SOC operations.


🔗 Navigation