forensicsmedium

Dream Job-2 Sherlock Scenario

hackthebox

Task: Analyze Lazarus Group's Operation Dream Job malware artifacts (ISO with trojanized SumatraPDF, VBA macros in phishing documents). Solution: MITRE ATT&CK research for DRATzarus/Torisma intelligence, PE metadata extraction for original filename, UPX packer identification, VBA macro analysis with oletools, VirusTotal OSINT for timestamps.

$ ls tags/ techniques/
vba_macro_extractionmitre_attack_researchiso_forensic_analysispe_metadata_extractionupx_packer_identificationole_metadata_forensicsvirustotal_osintdll_dropper_analysisshellcode_loader_analysis

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]