TeleStealer
Question 1
Malicious software frequently employs diverse methods to hide its presence and avoid detection. What packing tool was utilized to obfuscate this malware?

Question 2
Since the malware author used multiple techniques to hide its functions, where does the malware place the second stage?

Question 3
Looking into how the malware persist on the machine, what's the path of the registry key it uses to do this?


Question 4
We've noticed unusual network traffic in recent days since the discovery of the malware. We need to determine what data it might have sent out. What's the path of the exfiltrated data?

Question 5
You've verified that the malware is gathering sensitive data from compromised machines. It mainly uses a separate communication channel to send out the data. What is the full domain the malware use to exfiltrate the data?

Question 6
Once the channel is recognized, the next step is to determine who is receiving the exfiltrated data. Utilizing Python and the hosts file, can you determine the username of the recipient?


Last updated