Forwarded from Team ETF (ᴵ ᵃᵐ ᵍʳᵒᵒᵗ)
Sorry I forgot to tell the about captured memory file,
It's from otterctf.com
Login and see in memory forensics section
Or
Direct dwnld from
https://mega.nz/#!sh8wmCIL!b4tpech4wzc3QQ6YgQ2uZnOmctRZ2duQxDqxbkWYipQ
It's from otterctf.com
Login and see in memory forensics section
Or
Direct dwnld from
https://mega.nz/#!sh8wmCIL!b4tpech4wzc3QQ6YgQ2uZnOmctRZ2duQxDqxbkWYipQ
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
Forwarded from Team ETF (Groot)
If u really have any doubts
Contact me
@Etf_Zan_bot ( bot )
@zincster ( id )
I will try to respond fast😐
Contact me
@Etf_Zan_bot ( bot )
@zincster ( id )
I will try to respond fast😐
Forwarded from Team ETF (ᴵ ᵃᵐ ᵍʳᵒᵒᵗ)
Ok hold your beers 🍻 guyz,
If you are following otterctf no worries,
If not I will begin with the question too.
1. In the above given dump file ( otterctf.vmem)
The user used to play a online game, and u need to find the game name and it's server ip address.
How will u do, think?
Answer:-
Do netscan using volatility
If you are following otterctf no worries,
If not I will begin with the question too.
1. In the above given dump file ( otterctf.vmem)
The user used to play a online game, and u need to find the game name and it's server ip address.
How will u do, think?
Answer:-
Do netscan using volatility
Forwarded from Team ETF (ᴵ ᵃᵐ ᵍʳᵒᵒᵗ)
3. There's a malware in the dump file, now you need to track the malware.
Let's begin
Normally hackers make the malware to run in background, so let's check if there's any hidden processes using psxview plugin.
In most cases, both pslist and psscan will show False for malware, but here some special case😑
Let's begin
Normally hackers make the malware to run in background, so let's check if there's any hidden processes using psxview plugin.
In most cases, both pslist and psscan will show False for malware, but here some special case😑
Forwarded from Team ETF (Groot)
4. So let's use pstree plugin, which will show the running process in tree format.
And here we can see 2 suspicious process ( guessing as it might be malware )
Vmware-tray
Rick and monty
Because pid of Rick and monty matches with ppid of vmware-tray.
Pid - process id
Ppid - parent Pid
Vmware-tray is common process in vmwares . Name doesn't look suspicious.
Let's check where the file exists.
And here we can see 2 suspicious process ( guessing as it might be malware )
Vmware-tray
Rick and monty
Because pid of Rick and monty matches with ppid of vmware-tray.
Pid - process id
Ppid - parent Pid
Vmware-tray is common process in vmwares . Name doesn't look suspicious.
Let's check where the file exists.
Forwarded from Team ETF (Groot)
5. Let's use filescan module to check where does that actual file exists.
Now we can see that the file doesn't in vmware directory at all. It's in the most common malware directory "tmp".
Now it's sure that it is a virus.
To make sure 100% , dump that file to your device and scan it in the virus total. ( use dumpmem plugin or any suitable to dump ) .
Now we can see that the file doesn't in vmware directory at all. It's in the most common malware directory "tmp".
Now it's sure that it is a virus.
To make sure 100% , dump that file to your device and scan it in the virus total. ( use dumpmem plugin or any suitable to dump ) .