forensicsPromedium
Dream Job-2 Sherlock Scenario
hackthebox
As a Threat Intelligence Analyst investigating **Operation Dream Job**, you have identified that the **Lazarus Group** utilized a variety of custom-built malware and tools to facilitate their operations. Your task is to analyze and gather intelligence on the malware utilized by this APT.
$ ls tags/ techniques/
pe_analysisaptupxvba_macrophishinglazarus_groupthreat_intelligencemitre_attackiso_malwareole_metadatavirustotaloperation_dream_jobdratzarustorisma
vba_macro_extractionmitre_attack_researchiso_forensic_analysispe_metadata_extractionupx_packer_identificationole_metadata_forensicsvirustotal_osintdll_dropper_analysisshellcode_loader_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [forensics][Pro]Stockpile Breach— 0xl4ugh
- [forensics][Pro]Diagnostic— hackthebox
- [forensics][free]oBfsC4t10n2— hackthebox
- [forensics][Pro]TrueSecrets— hackthebox
- [web][Pro]Blueprint Heist— hackthebox