TeamWork
CHALLENGE DESCRIPTION
It is Friday afternoon and the SOC at Edny Consulting Ltd has received alerts from the workstation of Jason Longfield, a software engineer on the development team, regarding the execution of some discovery commands. Jason has just gone on holiday and is not available by phone. The workstation appears to have been switched off, so the only evidence we have at the moment is an export of his mailbox containing today’s messages. As the company was recently the victim of a supply chain attack, this case is being taken seriously and the Cyber Threat Intelligence team is being called in to determine the severity of the threat.
SOLUTION
Identify the sender of the suspicious email.
Open any email, we should see something like this
1
2
3
From: TLDR InfoSec <dan@tldrnewsletter.com>
To: jasonlongfield@edny.net
Subject: 49K Building Systems Exposed =?utf-8?Q?=F0=9F=8F=A2=2C?= Cellebrite
Now filter all the emails
1
grep "From: " * | sort -u | cut -d '<' -f2
sort -u
to filter unique emails, cut -d '<' -f2
to get the seconde field from <
character. Now let try all of them =))
Answer
theodore.todtenhaupt@developingdreams.siteThe suspicious email came from a custom domain, identify its creation date.
Hint
If the domain is expired or the WHOIS is somehow unavailable, you can find a WHOIS Lookup saved here
Answer
2025-01-31The domain was registered shortly before the suspicious email was received, which likely corresponds to the time when the threat actor was planning this campaign. Which MITRE ATT&CK sub-technique of the Resource Development tactic corresponds to this activity?
We go to MITRE ATT&CK and search for Resource Development
on the top right search bar, and click on it.
From previous question, it asks about domain, let read through the techniques, and we will see the domain sub-technique.
Answer
T1583.001The previously identified domain appears to belong to a company, what is the full URL of the company’s page on X (formerly Twitter)?i
Look at the domain’s name and hint from question.
It took me lots of time to figure it out, f*ckkkk
Answer
https://x.com/Develop_DreamsReading the suspicious email carefully, it appears that the threat actor first contacted the victim using the previously identified social media profile. Which MITRE ATT&CK sub-technique of the Resource Development tactic corresponds to this activity?
Search for social media
Answer
T1585.001What is the name of the game the threat actor would like us to collaborate on?
Click on that link, search for threat actor
we will see 2 links, open those and search for game.
Answer
DeTankWarWhat is the SHA-256 hash of the executable shared by the threat actor?
Search for SHA-256
Answer
56554117d96d12bd3504ebef2a8f28e790dd1fe583c33ad58ccbf614313ead8cAs part of the preparation of the tools for the attack, the threat actor hosted this file, presumably malware, on its infrastructure. Which MITRE ATT&CK sub-technique of the Resource Development tactic corresponds to this activity?
Search for infrastructure
Answer
T1608.001Based on the information you have gathered so far, do some research to identify the name of the threat actor who may have carried out this attack.
Answer
Moonstone SleeWhat nation is the threat actor believed to be associated with?
Answer
North KoreaAnother campaign from this threat actor used a trojanized version of a well-known software to infect victims. What is the name of this tool?
On the top right, we will see search bar, look for Moonstone Sleet
, click on it, and search for trojan
Answer
PuttyWhich MITRE ATT&CK technique corresponds to the activity of deploying trojanized/manipulated software?
Search for trojanized
, we will see distributed
Answer
T1195.002Our company wants to protect itself from other supply chain attacks, so in documenting more about this threat actor, the CTI team found that other security researchers were also tracking a group whose techniques closely match Moonstone Sleet, and discovered a new supply chain campaign around the end of July 2024. What technology is this campaign targeting?
Ahhhhh, I wasted lots of time for this. After searching like crazy with the hint from question, I got nothing.
I decided to ask ChatGPT, and well… We have the answer here.
Answer
NPMWe now need some indicators to be able to rule out that other systems have been compromised. What is the name and version of the lastest malicious package published? (Format: package-name vX.X.X)
Ask ChatGPT
Answer
harthat-hash v1.3.3The malicious packages downloaded an additional payload from a C2 server, what is its IP address?
Search the name of malicious package and we will have the IP.
Answer
142.111.77.196The payload, after being renamed, is finally executed by a legitimate Windows binary to evade defenses. Which MITRE ATT&CK technique corresponds to this activity?
Ask ChatGTP