Try Hack Me REvil Corp
@ Animesh Roy | Tuesday, Nov 23, 2021 | 4 minutes read | Update at Tuesday, Nov 23, 2021

OverView

You are involved in an incident response engagement and need to analyze an infected host using Redline.

REvil Corplogo
REvil Corp [FREE ROOM]REvil Corp

Task 01: Investigating the Compromised Endpoint

Scenario: One of the employees at Lockman Group gave an IT department the call; the user is frustrated and mentioned that all of his files are renamed to a weird file extension that he has never seen before. After looking at the user’s workstation, the IT guy already knew what was going on and transferred the case to the Incident Response team for further investigation.

You are the incident responder. Let’s see if you can solve this challenge using the infamous Redline tool. Happy Hunting, my friend!

To start your investigation, open the Mandiant Analysis file in the Analysis File folder on the Desktop.

Answer the questions below

TaskQuestionAns
1What is the compromised employee’s full name?employee name
2What is the operating system of the compromised host?windows host
3What is the name of the malicious executable that the user opened?malware
4What is the full URL that the user visited to download the malicious binary? (include the binary as well)File download Url
5What is the MD5 hash of the binary?hash
6What is the size of the binary in kilobytes?binary size
7What is the extension to which the user’s files got renamed?renamed files
8What is the number of files that got renamed and changed to that extension?number of files renamed
9What is the full path to the wallpaper that got changed by an attacker, including the image name?hacker wallpaper
10The attacker left a note for the user on the Desktop; provide the name of the note with the extension.hacker notes
11The attacker created a folder “Links for United States” under C:\Users\John Coleman\Favorites\ and left a file there. Provide the name of the file.hacker links
12There is a hidden file that was created on the user’s Desktop that has 0 bytes. Provide the name of the hidden file.size zero
13The user downloaded a decryptor hoping to decrypt all the files, but he failed. Provide the MD5 hash of the decryptor file.decrypt.exe
14In the ransomware note, the attacker provided a URL that is accessible through the normal browser in order to decrypt one of the encrypted files for free. The user attempted to visit it. Provide the full URL path.history
15What are some three names associated with the malware which infected this host? (enter the names in alphabetical order)OTX

compromised employee

img

What is the operating system of the compromised host?

find the info on system informaiton page

img

malicious executable

  • user might have been downloaded malicious executable using web/email. let’s check download history to find the ans.

img

full URL

ref to task 3 we can copy and paste the URL

MD5 hash of the binary

img

  1. click on timeline
  2. search for the malicious [executable](#malicious-executable)
  3. click on result
  4. search for next
  5. eventually you’ll see hash either on right side of result or you can click on show detail for better copy/paste!

size of binary

files got renamed

img

  1. click on file system
  2. select folders form user
  3. you’ll notice a not common extention name for few files.
  4. that’s the answer!

What is the number of files that got renamed and changed to that extension?

img

  1. goto timeline
  2. in timeline config check only changed & modified
  3. search for the ext
  4. you have the ans!!

full path to the wallpaper that got changed by an attacker

img

  1. goto timeline
  2. search for .bmp ext
  3. you have the ans!!!


attacker left a note for the user on the Desktop

img

  1. goto file system
  2. select user's desktop
  3. you’ll see the notes with .txt ext

img

  1. goto file system
  2. select user's favorites
  3. you’ll see a file under United States folder

hidden file that was created on the user’s Desktop

img

  1. goto file system
  2. select user's desktop
  3. you’ll see the file with 0 bytes

decryptor hoping to decrypt

img

  1. goto file system
  2. select user's desktop
  3. find the decryptor.exe
  4. click on show details or you can see the hash of that file in right pane

Free Decyptor

img

  1. Click on URL history
  2. search for decrypt ; quick findings
  3. paste the full URL as answer

three names associated with the malware

ref to OTX


© 2010 - 2024 Classroom

Reading Stuffs

Social Links

YOU CAN REUSE MY CONTENT