DroidPhish
CHALLENGE DESCRIPTION
Last night, most employees’ mobile devices were compromised, putting them at significant risk of leaking personal and private information. We require your expertise in digital forensics to help investigate this breach.
SOLUTION
Provide the last boot time of the device in UTC format.
Using Autopsy
to analyze this disk, on the left, search boottime
in File Name Search, we will see the time last changed, but it is EST, we need to change to UTC, click on ASCII String.
Answer
2024-11-24 12:05:19The user was exposed to a phishing attack. Provide the name of the email app used as the attack vector.
Search mail
Answer
Proton MailProvide the title of the phishing email.
Look at size
column, we will see the largest number, click on that file, find title
or subject
.
Answer
Celebrating 3 Years of Success – Thank You!Provide the time in UTC when the phishing email was received.
we will see the Date
is 2024-11-24 18:04:42 +0100, so we need to minus 1.
Answer
2024-11-24 17:04:42Provide the download URL for the malicious application.
Search download
, look for one of the largest file. Find https
Answer
https://provincial-consecutive-lbs-boots.trycloudflare.com/Booking.apkProvide the SHA-256 hash of the malicious application.
Search filename on hybrid-analysis
Answer
af081cd26474a6071cde7c6d5bd971e61302fb495abcf317b4a7016bdb98eae2Provide the package name of the malicious application.
Answer
com.hostel.mountProvide the installation timestamp for the malicious application in UTC.
Search Booking.apk
in File Name Search
Answer
2024-11-24 17:14:34Provide the number of runtime permissions granted to the malicious application.
On VirusTotal, Detail
tab, find permission
and count only red warning.
Answer
13Identify the C2 IP address and port that the malicious application was programmed to connect to.