8000 GitHub - findthebad/getting-personal
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
This repository was archived by the owner on Oct 5, 2022. It is now read-only.

findthebad/getting-personal

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Find the Bad: Getting Personal

This lab continues to build on the previous two exercises Model 3 and Powerfall Convo. It should only require the installation of Docker and Docker Compose.

Disclaimer

This lab is based on real data containing actual malicious indicators. If you attempt to do things such as find and run files, or visit network entities that occur in these logs, you do so at your own risk.

Setup

  1. Download and install Docker.
  2. Download and install Docker Compose (On Windows Docker Compose should be bundled with the Docker installer, so this step shouldn't be required).
  3. Download or clone this repository.
  4. Open up a command prompt, make your way to this repository folder on your local machine and run docker-compose up.
  5. When docker-compose up is finished bringing the containers up, open a browser and navigate to http://localhost:5601 to access the Kibana instance.

The Lab

This lab continues with the use of Kibana for identifying and investigating signs of a compromise. The VT Hunting dashboard should provide you the information you need to get started. If you're struggling or things aren't clear, make sure to look at the previous two labs in this introductory series.

Questions

  1. What is the name of the malicious file that has executed?
  2. What did the associated process do? Were there any other malicious indicators?
  3. What was the parent process that launched the malicious image? What does this tell you? Are there other indicators that confirm that?
  4. What process created the ddpp file? Did it create or delete any other files?
  5. What appears to be process that started all of this activity, when did it occur, on what computer and by what user?

Bonus: What advanced persistent threat (APT) has been discussed as being the group behind these indicators?

Useful Links

Solution

Available here.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
0