Showing 148 Result(s)

Tryhackme: Trooper Writeup

Lab link. Use Cyber Threat Intelligence knowledge and skills to identify a threat based on a report. 1. What kind of phishing campaign does APT X use as part of their TTPs? spear-phishing emails 2. What is the name of the malware used by APT X? USBferry 3. What is the malware’s STIX ID? malware–5d0ea014-1ce9-5d5c-bcc7-f625a07907d0 …

Tryhackme: Friday Overtime Writeup

Lab link. Step into the shoes of a Cyber Threat Intelligence Analyst and put your investigation skills to the test. 1. Who shared the malware samples? Oliver Bennett 2. What is the SHA1 hash of the file “pRsm.dll” inside samples.zip? 9d1ecbbe8637fed0d89fca1af35ea821277ad2e8 3. Which malware framework utilizes these DLLs as add-on modules? Calculated the SHA1 hash …

Tryhackme: Eviction Writeup

Lab link. 1. What is a technique used by the APT to both perform recon and gain initial access? Spearphishing Link is a technique used by APT28 in both the Reconnaissance and Initial Access phases. This makes T1598.003 – Spearphishing Link a key technique that serves dual purposes in the attack lifecycle. Spearphishing link 2. …

Tryhackme: Summit Writeup

Lab link. Questions 1. What is the first flag you receive after successfully detecting sample1.exe We start by clicking on the sample1.exe file and analyzing it using the Malware Sandbox tool to observe its behavior. Since we don’t have any IP address, domain, or external IOC at this point, we can block the malware using …

Tryhackme: Lookup Writeup

Lab link. Your local sticker shop has finally developed its own webpage. They do not have too much experience regarding web development, so they decided to develop and host everything on the same computer that they use for browsing the internet and looking at customer feedback. Smart move! Can you read the flag at http://MACHINE_IP:8080/flag.txt? …