C2 Detection - Command & Carol

Day 22

Explore how to analyze a large PCAP and extract valuable information.

Detecting C2 with RITA

Overview


Room URL: https://tryhackme.com/room/detecting-c2-with-rita-aoc2025-m9n2b5v8c1
Difficulty: Medium
Category: C2
Date Completed: 12/22/2025

Objectives


Table of Contents

Introduction
Walk Through
Lessons Learned
Resources


Introduction

This medium-difficulty challenge from TryHackMe's "Detecting C2 with RITA" room focuses on network traffic analysis and Command and Control (C2) detection. The challenge introduces Real Intelligence Threat Analytics (RITA), an open-source framework designed to identify C2 communication patterns through behavioral analysis of network logs. Participants are tasked with converting packet captures into Zeek logs, importing them into RITA, and leveraging RITA's analytics to identify malicious beaconing activity, suspicious connection patterns, and potential data exfiltration indicators.

The scenario involves analyzing network traffic captures from real-world malware incidents to detect AsyncRAT C2 infrastructure and other malicious communications hidden within legitimate-looking traffic. The challenge emphasizes the importance of understanding network-based indicators of compromise beyond signature-based detection.

Key Information

Features of RITA
Behind RITA
Threat Modifiers:
Query Types

Walk Through

  1. Start target machine
  2. How to use RITA
    1. zeek readpcap pcaps/AsyncRAT.pcap zeek_logs/asyncrat
    2. Pasted image 20251222115657.png
    3. Pasted image 20251222115724.png
    4. rita import --logs ~/zeek_logs/asyncrat/ --database asyncrat
    5. Pasted image 20251222115923.png
    6. rita view asyncrat
    7. Pasted image 20251222120257.png
  3. How many hosts are communicating with malhare.net?
    1. zeek readpcap pcaps/rita_challenge.pcap zeek_logs/rita_challenge
    2. rita import --logs rita_challenge/ --database rita_challenge
    3. rita view rita_challenge
      1. Pasted image 20251222121738.png
    4. 6
  4. Which Threat Modifier tells us the number of hosts communicating to a certain destination?
    1. Prevalence
  5. What is the highest number of connections to rabbithole.malhare.net?
    1. 40
      1. Pasted image 20251222121955.png
  6. Which search filter would you use to search for all entries that communicate to rabbithole.malhare.net with a beacon score greater than 70% and sorted by connection duration (descending)?
    1. dst:rabbithole.malhare.net beacon:>=70 sort:duration-desc
    2. Pasted image 20251222122743.png
    3. Pasted image 20251222122825.png
  7. Which port did the host 10.0.0.13 use to connect to rabbithole.malhare.net?
    1. Pasted image 20251222122846.png
    2. *80

Lessons Learned


Resources

TryHackMe
PCAP to Zeek
Zeek
RITA
C2 With RITA