[Day 12] Malware Analysis
December 12, 2022
Tools used
Flags
What is the architecture of the malware sample? (32-bit/64-bit)
What is the packer used in the malware sample? (format: lowercase)
What is the compiler used to build the malware sample? (format: lowercase)
How many MITRE ATT&CK techniques have been discovered attributed to the DISCOVERY tactic?
What is the registry key abused by the malware?
What is the value written on the registry key based on the previous question?
What are the names of two files created by the malware under the C:\Users\Administrator\ directory? (format: file1,file2 in alphabetical order)
What are the two domains wherein malware has initiated a network connection? (format: domain1,domain2 in alphabetical order)
Going back to strings inside the malware sample, what is the complete URL used to download the file hosted in the first domain accessed by the malware?
Last updated


