forensicsmedium
Dream Job-2 Sherlock Scenario
hackthebox
Task: Analyze Lazarus Group's Operation Dream Job malware artifacts (ISO with trojanized SumatraPDF, VBA macros in phishing documents). Solution: MITRE ATT&CK research for DRATzarus/Torisma intelligence, PE metadata extraction for original filename, UPX packer identification, VBA macro analysis with oletools, VirusTotal OSINT for timestamps.
$ ls tags/ techniques/
pe_analysisaptupxvba_macrophishinglazarus_groupthreat_intelligencemitre_attackiso_malwareole_metadatavirustotaloperation_dream_jobdratzarustorisma
vba_macro_extractionmitre_attack_researchiso_forensic_analysispe_metadata_extractionupx_packer_identificationole_metadata_forensicsvirustotal_osintdll_dropper_analysisshellcode_loader_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]