This room explores enriching file and hash artefacts using threat intelligence, covering malware analysis, hash identification, and behavioral analysis through various security platforms.
Answer: payroll.pdf, Double extensions
Answer: 2672B6688D7B32A90F9153D2FF607D6801E6CBDE61F509ED36D0450745998D58
Answer: trojan.graftor/flystudio
Answer: 2025-05-15 12:03:49
Answer: CyberFortress
Answer: DLL Side-Loading
Answer: BlackMoon, Discovery, windows-server-utility
Answer: regsvr32 %WINDIR%\Media\ActiveX.ocx /s
Answer: werfault.exe
Answer: svchost.exe
Answer: hxxp://121.182.174.27:3000/server.exe
Answer: 454
Answer: 43B0AC119FF957BB209D86EC206EA1EC3C51DD87BEBF7B4A649C7E6C7F3756E7
Answer: akira, filecryptor
Answer: 61 (Note this might change to 60)
Answer: akira_readme.txt
Answer: Get-WmiObject Win32_Shadowcopy | Remove-WmiObject
Answer: T1490