Happy Friday everyone! We are going to wrap this week of #miniCTF with a report from Avast shedding light on the infection chain and action-on-objectives of the HotRat malware, a variant of the AsyncRAT, and its use of a AutoHotkey script which has been compromising victims who are searching for free software and getting infected instead. Enjoy and Happy Hunting!
***In this miniCTF, I have mapped some of the TTPs to MITRE ATT&CK BUT I have either mislabeled or possibly left some out! It is up to you to correct me and fill in the blanks! Enjoy and good luck!***
Notable MITRE TTPs:
TA0002 - Execution
T1204.002 - User Execution: Malicious File
T1059.001 - Command And Scripting Interpreter: Powershell
TA0005 - Defense Evasion
T1562.006 - Impair Defenses: Disable or Modify Tools
TA0110 - Persistence
T1053.005 - Scheduled Task / Job: Scheduled Task
TA0001 - Collection
T1113 - Screen Capture
#CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday
