NerisBot Lab
First, let's see the available indexes.
| eventcount summarize=false index=*
| table index
#OR
From Settings -> Indexes.

Next, let's see the sourcetypes that we have.

Q1) Can you identify the IP address from which the initial unauthorized access originated?

Answer: 195.88.191.59
Q2) What is the domain name of the attacker server?

Answer: nocomcom.com
Q3) What is the IP address of the system that was targeted in this breach?

Answer: 147.32.84.165
Q4) Identify all the unique files downloaded to the compromised host. How many of these files could potentially be malicious?

Answer: 5
Q5) What is the sha256 hash of the malicious file disguised as a txt file?

Let's search by the sha1 on Virustotal to get the sha256.

Answer: 6fbc4d506f4d4e0a64ca09fd826408d3103c1a258c370553583a07a4cb9a6530
Last updated