ElectricBreeze-1
CHALLENGE DESCRIPTION
Your security team must always be up-to-date and aware of the threats targeting organizations in your industry. As you begin your journey as a Threat Intelligence Intern, equipped with some SOC experience, your manager has assigned you a task to test your research skills and how effectively you can leverage the MITRE ATT&CK
framework. * Conduct thorough research on Volt Typhoon
. * Use the MITRE ATT&CK framework to map adversary behavior and tactics into actionable insights. Impress your manager with your assessment, showcasing your passion for threat intelligence.
SOLUTION
Based on MITRE’s sources, since when has Volt Typhoon been active?
We go to MITRE ATT&CK and search for Volt Typhoon
, and click on it
Answer
2021MITRE identifies two OS credential dumping techniques used by Volt Typhoon. One is LSASS Memory access (T1003.001). What is the Attack ID for the other technique?
Search for T1003.001
Answer
T1003.003Which database is targeted by the credential dumping technique mentioned earlier?
Click on the link earlier. Search for database
Answer
Active DirectoryWhich registry hive is required by the threat actor to decrypt the targeted database?
Search for registry
Answer
SYSTEMDuring the June 2024 campaign, an adversary was observed using a Zero-Day Exploitation targeting Versa Director. What is the name of the Software/Malware that was used?
Search for Versa Director
, click on it, scroll down to Software
section.
Answer
VersaMemAccording to the Server Software Component, what type of malware was observed?
Answer
Web ShellWhere did the malware store captured credentials?
Click on Versa
link, search for Credential
Answer
/tmp/.temp.dataAccording to MITRE’s reference, a Lumen/Black Lotus Labs article(Taking The Crossroads: The Versa Director Zero-Day Exploitaiton.), what was the filename of the first malware version scanned on VirusTotal?
At the bottom or search Lotus
, we will see the link. Read the article and we will get the answer
Answer
VersaTest.pngWhat is the SHA256 hash of the file?
Search for SHA
Answer
4bcedac20a75e8f8833f4725adfc87577c32990c3783bf6c743f14599a176c37According to VirusTotal, what is the file type of the malware?
Go to VirusTotal
and paste the hash to the search bar.
Answer
JARWhat is the ‘Created by’ value in the file’s Manifest according to VirusTotal?
Click on Detail
tab.
Answer
Apache Maven 3.6.0What is the CVE identifier associated with this malware and vulnerability?
Answer
CVE-2024-39717According to the CISA document CISA referenced by MITRE, what is the primary strategy Volt Typhoon uses for defense evasion?
Go to the link they provided, search for defense evasion
Answer
LOTLIn the CISA document, which file name is associated with the command potentially used to analyze logon patterns by Volt Typhoon?
Read from that