Post

Let's Defend: Remote Working

Let's Defend: Remote Working

Challenge Link: https://app.letsdefend.io/challenge/remote-working File link: /root/Desktop/ChallengeFiles/ORDER_SHEET_SPEC.zip Password: infected

Question 1

What is the date the file was created?

I unzipped the malicious file and uploaded it to VirusTotal for analysis. To find the date the file was created I opened the Details tab and looked at the History section.

This gave me the time of 2020-02-01 18:28:07 UTC

Answer:

2020-02-01 18:28:07

Question 2

With what name is the file detected by Bitdefender antivirus?

I moved on to the Detection tab and in the Security Vendor’s Analysis section I found BitDefender’s results.

Answer:

Trojan.GenericKD.36266294

Question 3

How many files are dropped on the disk?

I had a hard time with this question surprisingly. The question hint indicates it should be a 1-digit number but all throughout the VirusTotal results are references to different amounts of dropped files. I researched this and came across others with write-ups for this challenge. No one else that solved this seemed to give a good justification for the answer but through process of elimination I discovered the answer was 3.

Answer:

3

Question 4

What is the sha-256 hash of the file with emf extension it drops?

I found the answer to this by going to the Associations tab and looking at the Dropped Files tab. It was listed as a “Windows Enhanced Metafile” file type.

Answer:

979dde2aed02f077c16ae53546c6df9eed40e8386d6db6fc36aee9f966d2cb82

Question 5

What is the exact URL to which the relevant file goes to download spyware?

I found the answer to this in the Behavior tab under the HTTP Requests section.

Answer:

https://multiwaretecnologia.com.br/js/Podaliri4.exe

This post is licensed under CC BY 4.0 by the author.