Introduction
The supplied memory image was captured on a compromised machine, analyze it to answer questions (this is the same image for the four forensic tests, useless to download several times).
When the machine was compromised, the attacker installed a Command & Control software that is currently inactive but must contact a server to receive his orders.
Find the server name and the port on which the malware should connect.
The validation key is servername:portnumber.
dump.gz (md5sum:1273931ce359f59bce95ce4507e1f4bf)
Continue reading [HackingWeek 2015] [Forensic 4] Write Up →