- Question 1 - How many events were returned for the month of March 2022? Change the date range to look at March 2022 log and you can answer first question.
- Question 2 -What is the IP associated with the suspected user in the logs? Question is asking about the source_ip filed. From the logs we can see 2 IP addresses so you much work to find right one.
- Question 3 - The user’s machine used a legit windows binary to download a file from the C2 server. What is the name of the binary? Answering this question took me longest time because I didnt find the right answer because I was either looking at wrong place or looked at right answer but not realising this was the answer. Hint look at the user_agent field ;)
- Question 4 - The infected machine connected with a famous filesharing site in this period, which also acts as a C2 server used by the malware authors to communicate. What is the name of the filesharing site? When we filter by IP from Question 2 we can answer this one quckly because there are only 2 logs from that source_ip.
- Question 5 - What is the full URL of the C2 to which the infected host is connected? Hostname + url field
- Question 6 - A file was accessed on the filesharing site. What is the name of the file accessed? We can connect to the filesharing site from URL from previous question and find a file there.
- Question 7 - The file contains a secret code with the format THM{_____}. Open file in the filesharing site and copy the flag code.
AudiTTRSi
No comments:
Post a Comment