Silent Breach Lab
Level: Medium
Challenge: Silent Breach Lab
Q1: What is the MD5 hash of the potentially malicious EXE file the user downloaded?


Q2: What is the URL from which the file was downloaded?



Q3: What application did the user use to download this file?
Q4: By examining Windows Mail artifacts, we found an email address mentioning three IP addresses of servers that are at risk or compromised. What are the IP addresses?

Q5: By examining the malicious executable, we found that it uses an obfuscated PowerShell script to decrypt specific files. What predefined password does the script use for encryption?



Q6: After identifying how the script works, decrypt the files and submit the secret string.

Last updated