RedLine Stealer lab.
For this lab we were given the following scenario:
You are part of the Threat Intelligence team in the SOC (Security Operations Center). An executable file has been discovered on a colleague's computer, and it's suspected to be linked to a Command and Control (C2) server, indicating a potential malware infection.
Our task is to investigate the executable file by using it's hash that was given to us in a text file within the downloadable lab file archive.
With this has we can simply go to VirusTotal and in the search tab paste they hash given.
This question is simple since all we have to do for this question is take the hash provided by the course that is extracted from the archive and submit it in the search tab as seen above in the VirusTotal platform. After that we will be seeing below a small box that will have the threat cateort in it.
This is also a simple step since below the hash on the VirusTotal platform we can see the name of the executable.
For this question all we have to do is go to the Details
tab above the box mentioned in Q2. After scrolling a little bit we can see in the history part the time of the first submission.
For this question all we have to do is go to the Behaviour
tab of the threat and scroll until we reach the Collection
technique that can be found under the MITRE ATT&CK Tacticsand Techniques tab
and thefirst entry is our answer.
The answer to this question can also be found in this page in the IP Traffic tab
and the second IP's url is our answer.
This answer too is in the same section just above the last question's answer and the only ip that does not seem to have a domain associated with it.
With a vasic google search of Redline stealer yara rule by Varp0s
we can simply naviate to the first result in YARAify and get our anwser without the _V2
part of the rule name.
Go to THREATfox and search just the ip that we found in Q6. With the only result returned, open the result's page and there you can see the malware alias of RedLine Stealer.
For the final step all we need to do is go back to the VirusTotal page and search for .dll
in the Modules loaded
section the last result given is the answer.
That is all for this lab, very lovely, we used some new tools with this. Overall amazing experience solving the lab.