• “An accountant at your organization received an email regarding an invoice with a download link. Suspicious network traffic was observed shortly after opening the email. As a SOC analyst, investigate the network trace and analyze exfiltration attempts.”

Question 1

  • “How many packets does the capture have?”

num

Answer: 4003

Question 2

  • “At what time was the first packet captured?”

num
Converting to UTC, this would be 2019-04-10 20:37

Answer: 2019-04-10 20:37

Question 3

  • “What is the duration of the capture?”

num

Answer: 01:03:41

Question 4

  • “What is the most active computer at the link level?”

link

Question 5

  • “Manufacturer of the NIC of the most active system at the link level?”

link

Answer: Hewlett-Packard

Question 6

  • “Where is the headquarter of the company that manufactured the NIC of the most active computer at the link level?”

Answer: Palo Alto

Question 7

  • “The organization works with private addressing and netmask /24. How many computers in the organization are involved in the capture?”

link

Answer: 3

Question 8

  • “What is the name of the most active computer at the network level?”

link

Answer: Beijing-5cd1-PC

Question 9

  • “What is the IP of the organization’s DNS server?”

link

Answer: 10.4.10.4

Question 10

  • “What domain is the victim asking about in packet 204?”

link

Answer: proforma-invoices.com

Question 11

  • “What is the IP of the domain in the previous question?”

Answer: 217.182.138.150

Question 12

  • “Indicate the country to which the IP in the previous section belongs.
CONSOLE
$ whois '217.182.138.150' | grep 'country'
country: FR
Click to expand and view more

Answer: France

Question 13

  • “What operating system does the victim’s computer run?”

link

Answer: Windows NT 6.1

Question 14

  • “What is the name of the malicious file downloaded by the accountant?”

link

Question 15

  • “What is the md5 hash of the downloaded file?”
CONSOLE
$ tshark -r stealer.pcap -Y 'frame.number == 3155' -T fields -e media.type | xxd -r -p > tkraw_Protected99.exe && md5sum tkraw_Protected99.exe
71826ba081e303866ce2a2534491a2f7  tkraw_Protected99.exe
Click to expand and view more

Answer: 71826ba081e303866ce2a2534491a2f7

Question 16

  • “What software runs the webserver that hosts the malware?”

link

Answer: LiteSpeed

Question 17

  • “What is the public IP of the victim’s computer?”

link

link

Answer: 173.66.146.112

Question 18

  • “In which country is the email server to which the stolen information is sent?”
CONSOLE
$ whois '23.229.162.69' | grep Country
Country:        US
Click to expand and view more

Answer: United States

Question 19

  • “Analyzing the first extraction of information. What software runs the email server to which the stolen data is sent?”

link

Answer: Exim 4.91

Question 20

  • “To which email account is the stolen information sent?”

Answer: sales.del@macwinlogistics.in

Question 21

  • “What is the password used by the malware to send the email?”

link

CONSOLE
$ printf 'U2FsZXNAMjMM=' | base64 -d
Sales@23
Click to expand and view more

Answer: Sales@23

Question 22

  • “Which malware variant exfiltrated the data?”

Answer: Reborn v9

Question 23

  • “What are the bankofamerica access credentials? (username:password)”

link

Answer: roman.mcguire:P@ssw0rd$

Question 24

  • “Every how many minutes does the collected data get exfiltrated?”

link

Answer: 10

Copyright Notice

Author: Devobass

Link: http://localhost:1313/posts/misc/cyberdefenders/hawkeye/

License: CC BY-NC-SA 4.0

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Please attribute the source, use non-commercially, and maintain the same license.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut