Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

TryHackMe File and Hash Threat Intel Full Walkthrough 2025

Автор: Djalil Ayed

Загружено: 2025-08-20

Просмотров: 1553

Описание:

This room seeks to teach on enriching file and hash artefacts using threat intelligence.

Room Link: https://tryhackme.com/room/fileandhas...

🐞Learning Objectives🐞

By completing this room, you will be able to:

🪲Interpret suspicious filepaths and filenames using heuristics.
🪲Generate and validate file hashes.
🪲Leverage VirusTotal and MalwareBazaar to enrich newly observed binaries.
🪲Extract behaviour from sandbox telemetry and map it to MITRE ATT&CK.

🐞Room Tasks 🐞

🤖 Filenames and Paths
One file displays one of the indicators mentioned. Can you identify the file and the indicator? (Answer: file, property)
🔥 File Hash Lookup
What is the SHA256 hash of the file bl0gger?
On VirusTotal, what is the threat label used to identify the malicious file?
When was the file first submitted for analysis? (Answer format: YYYY-MM-DD HH:MM:SS)
According to MalwareBazaar, which vendor classified the Morse-Code-Analyzer file as non-malicious?
On VirusTotal, what MITRE technique has been flagged for persistence and privilege escalation for the Morse-Code-Analyzer file?

😸 Sandbox Analysis:
What tags are used to identify the bl0gger.exe malicious file on Hybrid Analysis? (Answer: Tag1, Tag2, Tag3)
What was the stealth command line executed from the file?
Which other process was spawned according to the process tree?
The payroll.pdf application seems to be masquerading as which known Windows file?
What associated URL is linked to the file?
How many extracted strings were identified from the sandbox analysis of the file?

🛸 Threat Intelligence Challenge
What is the SHA256 hash of the file?
What family labels are assigned to the file on VirusTotal?
How many security vendors have flagged the file as malicious?
Name the text file dropped during the execution of the malicious file.
What PowerShell script is observed to be executed?
What is the MITRE ATT&CK ID associated with this execution?

🐕Websites Used in this video:🐕

🔥Virustotal: https://www.virustotal.com
🔥Hybrid Analysis: https://hybrid-analysis.com
🔥MalwareBazaar: https://bazaar.abuse.ch/
🔥MITRE ATT&CK: https://attack.mitre.org/versions/v14/


⚠️ Educational Purpose Only
This content is for educational and authorized penetration testing purposes only. Always ensure you have permission before testing on any systems.


Don't forget to 👍 LIKE and 🔔 SUBSCRIBE for more cybersecurity tutorials!

#TryHackMe

TryHackMe File and Hash Threat Intel Full Walkthrough 2025

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

TUSK W PANICE? ZIEMKIEWICZ I ŚWIETLIK KOMENTUJĄ

TUSK W PANICE? ZIEMKIEWICZ I ŚWIETLIK KOMENTUJĄ

❄️ JAK POPATRZYSZ NA JEGO TWARZ TO ZGINIESZ!? KEBAB (CZĘŚĆ 2)

❄️ JAK POPATRZYSZ NA JEGO TWARZ TO ZGINIESZ!? KEBAB (CZĘŚĆ 2)

Fileless Malware Analysis & PowerShell Deobfuscation

Fileless Malware Analysis & PowerShell Deobfuscation

Разбираем зачем он нужен и как им пользоваться | Первый отдел

Разбираем зачем он нужен и как им пользоваться | Первый отдел

Web Application Red Teaming - TryHackMe -

Web Application Red Teaming - TryHackMe -

Анализ вредоносных программ и угроз: обходы UAC

Анализ вредоносных программ и угроз: обходы UAC

Metasploit Hacking Demo (includes password cracking)

Metasploit Hacking Demo (includes password cracking)

🤷 AI обучен на говнокоде! Разработчиков компиляторов, протоколов и СУБД не хватает, а LLM не может

🤷 AI обучен на говнокоде! Разработчиков компиляторов, протоколов и СУБД не хватает, а LLM не может

Как хакеры взламывают Google 2FA

Как хакеры взламывают Google 2FA

FREE Ethical Hacking course (70 hours & includes Kali Linux labs)

FREE Ethical Hacking course (70 hours & includes Kali Linux labs)

What the Shell? - TryHackMe Junior Penetration Tester: 8.1

What the Shell? - TryHackMe Junior Penetration Tester: 8.1

Как обойти ограничения на загрузку файлов на сайт

Как обойти ограничения на загрузку файлов на сайт

GitOps com ArgoCD: O Tutorial COMPLETO de como implantar sua aplicação!

GitOps com ArgoCD: O Tutorial COMPLETO de como implantar sua aplicação!

Nmap Live Host Discovery - TryHackMe Junior Penetration Tester: 5.3

Nmap Live Host Discovery - TryHackMe Junior Penetration Tester: 5.3

The Truth About TryHackMe’s NEW Junior Penetration Tester Certification

The Truth About TryHackMe’s NEW Junior Penetration Tester Certification

Fileless Ransomware: Powershell Netwalker

Fileless Ransomware: Powershell Netwalker

I took the TryHackMe Security Analyst Level 1 Certification (SAL1)

I took the TryHackMe Security Analyst Level 1 Certification (SAL1)

Как устроена ФСБ России

Как устроена ФСБ России

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

БЕЛЫЕ СПИСКИ: какой VPN-протокол справится? Сравниваю все

БЕЛЫЕ СПИСКИ: какой VPN-протокол справится? Сравниваю все

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]