trooper (thm)
January 22nd 2025 | #ctf #cti #tryhackme
Task: "Use Cyber Threat Intelligence knowledge and skills to identify a threat based on a report."
What kind of phishing campaign does APT X use as part of their TTPs?
Answer: Spear-phishing emails
What is the name of the malware used by APT X?
Answer: USBFerry
What is the malwares STIX ID?
Answer: malware--5d0ea014-1ce9-5d5c-bcc7-f625a07907d0
With the use of a USB, what technique did APT X use for initial access?
Answer: Replication Through Removable Media https://attack.mitre.org/techniques/T1091/
What is the identity of APT X?
Tropic Trooper is an unaffiliated threat group that has led targeted campaigns against targets in Taiwan, the Philippines, and Hong Kong. Tropic Trooper focuses on targeting government, healthcare, transportation, and high-tech industries and has been active since 2011.
Associated Groups: Pirate Panda, KeyBoy
Answer: Tropic Trooper
On OpenCTI, how many Attack Pattern techniques are associated with the APT?
Answer: 39
What is the name of the tool linked to the APT?
BITSAdmin is a command line tool used to create and manage BITS Jobs.
Answer: BITSAdmin
Load up the Navigator. What is the sub-technique used by the APT under Valid Accounts?
ID: T1078.003 Sub-technique of: T1078
Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service.
Answer: Local Accounts
Under what Tactics does the technique above fall?
What technique is the group known for using under the tactic Collection?
Once established within a system or network, an adversary may use automated techniques for collecting internal data. Methods for performing this technique could include use of a Command and Scripting Interpreter to search for and copy information fitting set criteria such as file type, location, or name at specific time intervals.
https://attack.mitre.org/techniques/T1119/
Answer: Automated Collection
< The Killer Clown (hacktoria) | TryHack3M: Bricks Heist (thm) >