# NerisBot Lab

First, let's see the available indexes.

```splunk-spl
| eventcount summarize=false index=* 
| table index
```

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FvQKnj1l35NJ2r86mRQ6p%2FScreenshot(16).png?alt=media&#x26;token=29c7a939-661e-4090-858d-dc8667a99864" alt=""><figcaption></figcaption></figure>

\#OR&#x20;

From Settings -> Indexes.

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2F8sxkbCSApoSZQ95g4zjN%2FScreenshot(17).png?alt=media&#x26;token=03da153f-2bf8-4e9e-b125-77396294f57f" alt=""><figcaption></figcaption></figure>

Next, let's see the sourcetypes that we have.

```splunk-spl
| metadata type=sourcetypes
```

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FPvVzhl1H2s8994NSZuHH%2FScreenshot(18).png?alt=media&#x26;token=8de410a1-84a3-4baa-9cbb-a57afef0c51d" alt=""><figcaption></figcaption></figure>

Q1) Can you identify the IP address from which the initial unauthorized access originated?

```splunk-spl
index=* sourcetype=suricata
| stats values(dest_ip) values(http.hostname) values(http.url) by src_ip
```

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FLNO7uqKBhwK14A42BAO1%2FScreenshot(19).png?alt=media&#x26;token=e8da6139-aa9d-4330-b835-52b2852dcd7c" alt=""><figcaption></figcaption></figure>

Answer:  195.88.191.59

Q2) What is the domain name of the attacker server?

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FCYCe7Kk35tNWkSTWFf1L%2FScreenshot(20).png?alt=media&#x26;token=94d02cef-95b1-46e8-8cf1-3b2c554cd9a6" alt=""><figcaption></figcaption></figure>

Answer:  nocomcom.com

Q3) What is the IP address of the system that was targeted in this breach?

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FnMVYufNaYkmOzI5q8RBo%2FScreenshot(21).png?alt=media&#x26;token=6aa8aef6-024b-4fc2-9349-4d1649d7d1a2" alt=""><figcaption></figcaption></figure>

Answer:  147.32.84.165

Q4) Identify all the unique files downloaded to the compromised host. How many of these files could potentially be malicious?

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2F64rGxcWkk8lRV8N9WSDm%2FScreenshot(22).png?alt=media&#x26;token=c435a0c7-d305-4faf-a105-f03946bdb818" alt=""><figcaption></figcaption></figure>

Answer: 5 &#x20;

Q5) What is the sha256 hash of the malicious file disguised as a txt file?

```splunk-spl
index=* sourcetype=zeek:files tx_hosts="195.88.191.59" 
| join left=L right=R where L.seen_bytes=R.bytes
    [search index=* sourcetype=suricata src_ip=147.32.84.165 dest_ip=195.88.191.59 url=* ]
| table L.md5, L.sha1, R.url
```

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FJhrgLtWBrCDkmB8jPpAl%2FScreenshot(23).png?alt=media&#x26;token=f4de7dbc-4149-41a7-b044-04141fdcea56" alt=""><figcaption></figcaption></figure>

Let's search by the sha1 on Virustotal to get the sha256.

<figure><img src="https://2537271824-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIswWWP3l0rGuQmG2WUcr%2Fuploads%2FhpFOMAph7j3V8SueqrQp%2FScreenshot(24).png?alt=media&#x26;token=661c624e-1d6f-444d-a003-c117fd091bfd" alt=""><figcaption></figcaption></figure>

Answer:  6fbc4d506f4d4e0a64ca09fd826408d3103c1a258c370553583a07a4cb9a6530
