AzurePot
Link : https://cyberdefenders.org/blueteam-ctf-challenges/azurepot/
Last updated
Link : https://cyberdefenders.org/blueteam-ctf-challenges/azurepot/
Last updated
Q1 File => sdb.vhd There is a script that runs every minute to do cleanup. What is the name of the file?
Answer : .remove.sh
Q2 File => sdb.vhd The script in the Q#1 terminates processes associated with two Bitcoin miner malware files. What is the name of 1st malware file?
Answer : kinsing
Q3 File => sdb.vhd The script in Q#1 changes the permissions for some files. What is their new permission?
Answer : 444
Q4 File => sdb.vhd What is the sha256 of the botnet agent file?
Answer : 0e574fd30e806fe4298b3cbccb8d1089454f42f52892f87554325cb352646049
Q5 File => sdb.vhd What is the name of the botnet in Q#4?
Description : https://malpedia.caad.fkie.fraunhofer.de/details/elf.tsunami
Answer : tsunami
Q6 File => sdb.vhd What IP address matches the creation timestamp of the botnet agent file in Q#4?
Created Time of file dk86
Q7 File => sdb.vhd What URL did the attacker use to download the botnet agent?
Answer : http://138.197.206.223:80/wp-content/themes/twentysixteen/dk86
Q8 File => sdb.vhd What is the name of the file that the attacker downloaded to execute the malicious script and subsequently remove itself?
Answer : .install
Q9 File => sdb.vhd The attacker downloaded sh scripts. What are the names of these files?
Answer : 0_cron.sh, 0_linux.sh, ap.sh
Q10 File => UAC Two suspicious processes were running from a deleted directory. What are their PIDs?
Answer : 6388, 20645
Q11 File => UAC What is the suspicious command line associated with the 2nd PID in Q#10?
Answer : sh .src.sh
Q12 File => UAC UAC gathered some data from the second process in Q#10. What is the remote IP address and remote port that was used in the attack?
Answer : 116.202.187.77:56590
Q13 File => UAC Which user was responsible for executing the command in Q#11?
Answer : daemon
Q14 File => UAC Two suspicious shell processes were running from the tmp folder. What are their PIDs?
Answer : 15853, 21785
Q15 File => ubuntu.20211208.mem What is the MAC address of the captured memory?
Answer : 00:22:48:26:3b:16
Q16 File => ubuntu.20211208.mem From Bash history. The attacker downloaded an sh script. What is the name of the file?
Answer : unk.sh