Lufer

  • 首页
  • 编程
  • 学习笔记
  • 日常折腾
Lufer
Code the World
  1. 首页
  2. 学习笔记
  3. WriteUP
  4. 正文

Blue Team CTF-XLMRat Lab

2025年11月20日 4点热度 0人点赞 0条评论

Analyze network traffic to identify malware delivery, deobfuscate scripts, and map attacker techniques using MITRE ATT&CK, focusing on stealthy execution and reflective code loading.

Scenario

A compromised machine has been flagged due to suspicious network traffic. Your task is to analyze the PCAP file to determine the attack method, identify any malicious payloads, and trace the timeline of events. Focus on how the attacker gained access, what tools or techniques were used, and how the malware operated post-compromise.

Questions

Q1.The attacker successfully executed a command to download the first stage of the malware. What is the URL from which the first malware stage was installed?

追踪HTTP流,http://45.126.209.4:222/mdm.jpg

Q2.Which hosting provider owns the associated IP address?

直接查询IP信息,得到 ReliableSite.Net

Q3.By analyzing the malicious scripts, two payloads were identified: a loader and a secondary executable. What is the SHA256 of the malware executable?

流中可以看到这样一个文件。

先复制出来,把下划线去掉,然后作为hex输入,进行sha256计算。

Q4.What is the malware family label based on Alibaba?

微步跑一下,得到家族为AsyncRat

Q5.What is the timestamp of the malware's creation?

DIE跑一下,得到时间戳,但是这里有个坑,不知道是不是时区问题,答案要少8个小时,为2023–10–30 15:08

Q6.Which LOLBin is leveraged for stealthy process execution in this script? Provide the full path.

追踪HTTP流,找到启动程序,替换掉其中的#,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe

Q7.The script is designed to drop several files. List the names of the files dropped by the script.

Conted.ps1,Conted.bat,Conted.vbs

标签: CTF 取证
最后更新:2025年11月20日

Lufer

新的一天开始啦

点赞
< 上一篇
下一篇 >

文章评论

razz evil exclaim smile redface biggrin eek confused idea lol mad twisted rolleyes wink cool arrow neutral cry mrgreen drooling persevering
取消回复

文章目录
  • Scenario
  • Questions

COPYRIGHT © 2025 lufer.cc.

Theme Kratos Made By Seaton Jiang

鲁ICP备2021045819号