当前位置:网站首页>Revil - blackmail Virus Emergency Response
Revil - blackmail Virus Emergency Response
2022-06-23 17:52:00 【Khan security team】
The load name is AnalysisSession1 Of Mandiant After analyzing the file , I navigate to “ Analyze the data > user ” To identify the different users present on the infected host . Here I can see the full name of the employee :
2. What is the operating system of the infected host ?
To find the operating system of the infected host , We can navigate to “ Analyze the data > system information ” And view the operating system information :
3. What is the name of the malicious executable opened by the user ?
According to the title of the room and the description of the challenge , The infected host appears to have been REvil Ransomware infection . I did some research on the Internet , I found the Secureworks This article of :
REvil/Sodinokibi Blackmail Software
author : Anti threat unit research group REvil( Also known as Sodinokibi) Extortion software in 4 month 17 It was first discovered on the th ......
Read through this article , I have learned that , As part of ransomware delivery , Threat actors use strategic networks to invade (SWC) By destroying Italy WinRAR Website and replace with malware instances WinRAR Install the executable to deliver REvil .SWC This leads to an unsuspecting WinRAR Infection of the customer system .
stay Redline in , I navigate to “ Analyze the data > file system ”, Found the... Opened by the user WinRAR Malicious executable :
4. The integrity that users access when downloading malicious binaries URL What is it? ?( Also includes binaries )
stay Redline in , I navigate to “ Analyze the data > File download history ” And find out what to use to download malicious binaries file Source URL:
5. The binary MD5 What is the hash value ?
To find malice WinRAR Binary files MD5 Hash , We can navigate to Redline Medium “ Analyze the data > file system ”, Then double click. WinRAR Entry for more details , For example, its file hash :
6. How many kilobytes is the size of the binary file ?
To find malice WinRAR File size of binary file , We can navigate to Redline Medium “ Analyze the data > file system ”, Then double click. WinRAR Entry for more details , For example, file size :
7. What is the extension for renaming user files ?
According to the above SecureWorks article ,REvil Check Software\recfg Whether there is... In the registry key rnd_ext value . This value contains the... Generated at run time Attach to encrypted file Of Random extension . If this registry value does not exist , The malware will generate a small letter (az) And number (0–9) A random string of components , The length range is 5 To 10 Characters ( contain ), And begin with a period ( for example ,.9781xsd4).
stay Redline in , I navigate to “ Analyze the data > file system ” And see a random file extension , Similar to the above description and example :
8. What is the number of files renamed and changed to this extension ?
To confirm rename and change to problem 7 Number of files with extensions determined in , I navigate to “ Analyze the data > Timeline ” And filter the extension in the summary column :
9. What is the full path of the wallpaper changed by the attacker , Include image name ?
Reference resources SecureWorks, If the encryption process is successful ,REvil Will change the desktop background , Make the victim aware of the threat .REvil Use a random file name to save the image to the host %Temp% Directory , The file name consists of a length of 3 To 13 Characters of lowercase letters and numbers , And add “ .bmp ” Extension ( for example ,C:\Users\ <user> \AppData\ Local \Temp\cd2sxy.bmp).
stay Redline in , I navigate to “ Analyze the data > Timeline ”, Then filter any with .bmp File with extension . I found one with SecureWorks The description provided matches the file :
10. The attacker left a note for the user on the desktop ; Provide a comment name with an extension .
stay Redline in , I navigate to “ Analyze the data > file system ”, Discover the notes left by the attacker on the user's desktop :
11. The attacker is C:\Users\John Coleman\Favorites\ I created a “Links for United States” Folder , And left a file there . Provide file name .
stay Redline in , I navigate to “ Analyze the data > file system ”, stay “ C:\Users\John Coleman\Favorites\ ” The file left by the attacker was found under :
12. Create a on the user's desktop 0 Hidden file of bytes . Provide the name of the hidden file .
stay Redline in , I navigate to “ Analyze the data > file system ” And search for a 0 Byte file :
13. The user downloaded a decryptor , Hope to decrypt all files , But failed . Provides the... For decrypting files MD5 Hash value .
stay Redline in , I navigate to “ Analyze the data > file system ” And see a name “decryp.tor.exe” The file of . I double-click the entry and see MD5 Hash :
14. In the ransomware description , The attacker has provided a... That can be accessed through a normal browser URL, To decrypt one of the encrypted files for free . The user tried to access it . Provide complete URL route .
Read through SecureWorks article , The ransom note instructs the victim to use Unique URL To decrypt their files . The website provides trial decryption to prove that the victim can decrypt the file , As shown in the figure below :
Look at the image , I can see “ Decryptor ” The word is used as the only URL Part of . stay Redline in , I navigate to “ Analyze the data > Browse URL Historical record ” And filter keywords “ Decryptor ”:
15. What are the three names associated with malware that infects this host ?( Enter names in alphabetical order )
I already know that the host has been REvil Blackmail attacks
边栏推荐
- Interface ownership dispute
- 创新技术领航者!华为云GaussDB获颁2022年云原生数据库领域权威奖项
- 《AN4190应用笔记 天线选择指南》——天线理论2
- 解答02:Smith圓為什麼能“上感下容 左串右並”?
- Look, this is the principle analysis of modulation and demodulation! Simulation documents attached
- console. Log() is an asynchronous operation???
- Tencent Qianfan scene connector: worry and effort saving automatic SMS sending
- C. Set or Decrease-Educational Codeforces Round 120 (Rated for Div. 2)
- MySQL的 安装、配置、卸载
- Analysis of object class structure in Nanny level teaching (common class) [source code attached]
猜你喜欢

时间戳90K是什么意思?

MySQL transaction and its characteristics and locking mechanism

Hands on data analysis unit 2 section 4 data visualization
![[go] calling Alipay to scan code for payment in a sandbox environment](/img/d4/c6d72a697bc08f69f11121a15109b3.png)
[go] calling Alipay to scan code for payment in a sandbox environment

FPN characteristic pyramid network
![QT layout manager [qvboxlayout, qhboxlayout, qgridlayout]](/img/62/a0425a325f123ba91a7a69cf854d2c.png)
QT layout manager [qvboxlayout, qhboxlayout, qgridlayout]

Robot Orientation and some misunderstandings in major selection in college entrance examination

Self supervised learning (SSL)
![[network communication -- webrtc] analysis of webrtc source code -- supplement of pacingcontroller related knowledge points](/img/18/dda0c7fa33ee6cdf2bbb2f85099940.png)
[network communication -- webrtc] analysis of webrtc source code -- supplement of pacingcontroller related knowledge points

MySQL事务及其特性与锁机制
随机推荐
一文入门智能开关的3种功能形态
EasyPlayer移动端播放webrtc协议时长按播放页面无法关闭“关于我们”页面
浅谈5类过零检测电路
酒店入住时间和离店时间的日期选择
[Hyperf]Entry “xxxInterface“ cannot be resolved: the class is not instantiable
Interface ownership dispute
QT布局管理器【QVBoxLayout,QHBoxLayout,QGridLayout】
[go]沙盒环境下调用支付宝扫码支付
[30. concatenate substrings of all words]
Intelligent supply chain collaborative management solution for logistics industry
Self supervised learning (SSL)
Postgresql_根据执行计划优化SQL
【30. 串联所有单词的子串】
Transaction processing of cloud development database
MySQL的 安装、配置、卸载
PostgreSQL series articles -- the world's most advanced open source relational database
Redis ubuntu18.04.6 intranet deployment
High availability solution practice of mongodb advanced applications (4)
The principle of MySQL index algorithm and the use of common indexes
Hands on data analysis unit 2 section 4 data visualization