D. Burke

TechnoSavage

View on GitHub

Friday Overtime Walkthrough (easy)

Q: Who shared the malware samples?

Once logging into DocIntel the latest documents shows the most recent “Urgent” where the individual who shared the files introduces themselves as

Oliver Bennett

Q: What is the SHA1 hash of the file “pRsm.dll” inside samples.zip?

Download “samples.zip” from the above message

9d1ecbbe8637fed0d89fca1af35ea821277ad2e8

Q: Which malware framework utilizes these DLLs as add-on modules?


Q: Which MITRE ATT&CK Technique is linked to using pRsm.dll in this malware framework?

T1123

Q: What is the CyberChef defanged URL of the malicious download location first seen on 2020-11-02?

hxxp[://]update[.]browser[.]qq[.]com/qmbs/QQ/QQUrlMgr_QQ88_4296.exe	

What is the CyberChef defanged IP address of the C&C server first detected on 2020-09-14 using these modules?

122[.]10[.]90[.]12

What is the md5 hash of the spyagent family spyware hosted on the same IP targeting Android devices in Jun 2025?

951f41930489a8bfe963fced5d8dfd79