You are currently working as a Malware Reverse Engineer for your organisation. Your team acts as a support for the SOC team when detections of unknown binaries occur. One of the SOC analysts triaged an alert triggered by binaries with unusual behaviour. Your task is to analyse the binaries detected by your SOC team and provide enough information to assist them in remediating the threat.
The team has provided two investigation platforms, a FLARE VM and a REMnux VM. You may utilise the machines based on your preference.
If you prefer FLARE VM, you may start the machine attached to this task. Else, you may start the machine on the task below to start REMnux VM.
Lastly, you may find the malware samples on C:\Users\Administrator\Desktop\Samples.
WE ADVISE YOU NOT TO DOWNLOAD THE MALWARE SAMPLES TO YOUR HOST.
32-bit
trojan.zbot/razy
HEUR/AGEN.1306860
pe-tree malbuster_2
mscoree.dll
md5sum malbuster_3
Malware-bazaar Query:
md5:47ba62ce119f28a55f90243a4dd8d324
TrickBot
md5sum malbuster_4
malware-bazaar Query:
md5:47ba62ce119f28a55f90243a4dd8d324
Zloader
pe-tree malbuster_4
!This Salfram cannot be run in DOS mode.
pe-tree malbuster_4
shell32.dll
capa malbuster_1
3
we use strings function and grep any strings with the value God (-i ignore case distinctions )
malbuster_2
Just your average day: parsing dodgy EXEs, decoding malware labels, and realizing everything still starts with GodMode.
Cybersecurity learner, log nerd, and TryHackMe badge hoarder. Let’s connect on LinkedIn before I get pulled into another packet capture.
Apparently we have to tell you this: yes, cookies are used. They're not edible, and no, you can't escape them — but you can pick what gets tracked. Yay for EU law!