File Hashes Analysis with Power BI from Data Stored in DShield SIEM
March 13, 2025, 11:56 a.m.
Description
This analysis showcases the use of Power BI to examine file hash data from a DShield SIEM over a 60-day period. The process involved exporting data from Elastic Discover, importing it into Power BI, and creating visualizations for analysis. Key findings include the identification of an IP address (87.120.113.231) associated with RedTail malware, uploading six different files with multiple hashes. The analysis also revealed the reappearance of a previously identified Linux Trojan (Xorddos) from new IP addresses within the same subnet. Additionally, two strange filenames were discovered and investigated, with one identified as an IRCBot through VirusTotal. This method of large dataset analysis proves valuable in uncovering potentially overlooked or lost data through retrospective examination.
Tags
Date
- Created: March 13, 2025, 9:45 a.m.
- Published: March 13, 2025, 9:45 a.m.
- Modified: March 13, 2025, 11:56 a.m.
Attack Patterns
- IRCBot
- RedTail
- Xorddos
- T1547
- T1071
- T1102
- T1036
- T1204
- T1027
- T1053
- T1078
- T1059