Just Another Blue Teamer · @LeeArchinal
100 followers · 163 posts · Server ioc.exchange

Happy Friday everyone! We are going to wrap this week of with a report from Avast shedding light on the infection chain and action-on-objectives of the HotRat malware, a variant of the AsyncRAT, and its use of a AutoHotkey script which has been compromising victims who are searching for free software and getting infected instead. Enjoy and Happy Hunting!

***In this miniCTF, I have mapped some of the TTPs to MITRE ATT&CK BUT I have either mislabeled or possibly left some out! It is up to you to correct me and fill in the blanks! Enjoy and good luck!***

Notable MITRE TTPs:
TA0002 - Execution
T1204.002 - User Execution: Malicious File
T1059.001 - Command And Scripting Interpreter: Powershell

TA0005 - Defense Evasion
T1562.006 - Impair Defenses: Disable or Modify Tools

TA0110 - Persistence
T1053.005 - Scheduled Task / Job: Scheduled Task

TA0001 - Collection
T1113 - Screen Capture

#minictf #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #happyhunting #readoftheday

Last updated 1 year ago

Just Another Blue Teamer · @LeeArchinal
100 followers · 163 posts · Server ioc.exchange

Good day everyone! This Thursday's is brought to you by the Lookout professionals Kristina Balaam and Justin Albrecht. In their latest threat intel they provide details of the and Android surveillanceware that is attributed to APT41, a group that is based out of the People's Republic of China. These malware masquerade as legitimate apps on the Google play store to trick their victims to downloading and installing them. Enjoy and Happy Hunting!

Link in the comments

***Let's step this up a notch! I am going to give you just the Tactic, can you fill in the techniques and sub-techniques? Good luck!***

Notable MITRE ATT&CK TTPs:
Mobile Matrix
TA0035 - Collection

TA0027 - Initial Access

Lookout Attributes Advanced Android Surveillanceware to Chinese Espionage Group APT41
lookout.com/threat-intelligenc

#minictf #wyrmspy #dragonegg #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #happyhunting #readoftheday

Last updated 1 year ago

Just Another Blue Teamer · @LeeArchinal
100 followers · 159 posts · Server ioc.exchange

The next installment of the SentinelOne and blog series features Millie Nym as they demonstrate their unique reverse engineering techniques as they analyze a sample of ArechClient2. Enjoy and Happy Hunting!

***As usual, for this , I am going to leave out a piece of information and it is your job to find it! DM me with the answer or leave a comment!
Hint: Check the links in the article!***

Notable MITRE ATT&CK TTPs:
TA0005 - Defense Evasion
T1055.? - Process Injection: [fill in this blank]
T1562 - Impair Defenses: Disable or Modify Tools
T1112 - Modify Registry

TA0009 - Collection
T1005 - Data from Local System

TA0011 - Command and Control
T1102 - Web Service

Reverse Engineering Walkthrough | Analyzing A Sample Of Arechclient2
sentinelone.com/blog/reverse-e

#VXUnderground #minictf #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #happyhunting #readoftheday

Last updated 1 year ago

Just Another Blue Teamer · @LeeArchinal
95 followers · 154 posts · Server ioc.exchange

Happy Friday everyone! Travel the world with the Check Point Software Technologies Ltd research team as they report how spread uncontrollably. Enjoy and Happy Hunting!

Link in the comments!

***Here is your challenge***
Beginner: What MITRE ATT&CK relates to the way the malware propagates?
Intermediate: There are at least two means of persistence mentioned in this article. What are they and what are their Technique/sub-technique IDs and titles?
Extra Credit: What log sources and event codes from those log sources will capture either the beginner's or intermediate (or both) challenges activity?

#camarodragon #minictf #cybersecurity #itsecurity #infosec #blueteam #threatintel #threathunting #ThreatDetection #happyhunting

Last updated 1 year ago

Alex Radocea :verified: · @alexrad
142 followers · 37 posts · Server infosec.exchange

Heard you like turtles -- we're finally live with February's challenge

Play along and send in your writeups and you might just win a raspberry pi!

turtles.supernetworks.org/febr

github.com/spr-networks/turtle

#minictf #turtles #wifihacking

Last updated 1 year ago