Showing 130 Result(s)

Tryhackme: Friday Overtime Writeup

Lab link. Step into the shoes of a Cyber Threat Intelligence Analyst and put your investigation skills to the test. 1. Who shared the malware samples? Oliver Bennett 2. What is the SHA1 hash of the file “pRsm.dll” inside samples.zip? 9d1ecbbe8637fed0d89fca1af35ea821277ad2e8 3. Which malware framework utilizes these DLLs as add-on modules? Calculated the SHA1 hash …

Tryhackme: Eviction Writeup

Lab link. 1. What is a technique used by the APT to both perform recon and gain initial access? Spearphishing Link is a technique used by APT28 in both the Reconnaissance and Initial Access phases. This makes T1598.003 – Spearphishing Link a key technique that serves dual purposes in the attack lifecycle. Spearphishing link 2. …

Tryhackme: Summit Writeup

Lab link. Questions 1. What is the first flag you receive after successfully detecting sample1.exe We start by clicking on the sample1.exe file and analyzing it using the Malware Sandbox tool to observe its behavior. Since we don’t have any IP address, domain, or external IOC at this point, we can block the malware using …