team1

1st place

995 points


Awards


Solves

Challenge Category Value Time
Ransomware Deployment via ShadowPad Chinese Malware 25
SSL JARM analysis of the C2 Infrastructure Chinese Malware 50
OST - Identifying the Command-and-Control (C2) Server OST Tools 25
The Evolution of Chinese Malware Chinese Malware 25
Chinese Malware - APT Espionage Targeting Chinese Malware 25
Lactrodectus 3 Commodity Malware 25
Lactrodectus 2 Commodity Malware 25
Polar Edge Botnet - Category 1: Initial Access & Payloads Q5 ORB Networks 15
Lactrodectus 1 Commodity Malware 25
Polar Edge Botnet - Category 1: Initial Access & Payloads Q4 ORB Networks 15
Polar Edge Botnet - Category 1: Initial Access & Payloads Q2 ORB Networks 15
Polar Edge Botnet - Category 2: Shodan Infrastructure Hunt Q8 ORB Networks 50
Pivoting 101 - 1 Pivoting 101 15
Polar Edge Botnet - Category 2: Shodan Infrastructure Hunt Q12 ORB Networks 35
OST Tools - Attributing the C2 server properties OST Tools 75
Polar Edge Botnet - Category 2: Shodan Infrastructure Hunt Q11 ORB Networks 35
OST - Fingerprinting the C2 in Shodan OST Tools 25
OST - Attribution of the C2 Server OST Tools 25
Polar Edge Botnet - Category 2: Shodan Infrastructure Hunt Q7 ORB Networks 25
Polar Edge Botnet - Category 1: Initial Access & Payloads Q3 ORB Networks 25
Polar Edge Botnet - Category 2: Shodan Infrastructure Hunt Q6 ORB Networks 20
Polar Edge Botnet - Category 0: It Begins ORB Networks 20
Lumma's New Fingerprints: The Trinity Information Stealers 30
Polar Edge Botnet - Category 1: Initial Access & Payloads Q1 ORB Networks 15
Lumma's New Fingerprints: The Data Dump Information Stealers 30
Hunting Phishing Infrastructure Starting Point 100
Lumma's New Fingerprints: The Check-In Information Stealers 25
Lumma's New Fingerprints: The Imposter Information Stealers 25
Iranian APT Tracking 2 Nation State - Iran 25
Iranian APT Tracking Nation State - Iran 25
Impersonating cloud services Starting Point 25
The Economics of Phishing-as-a-Service Starting Point 25
Understanding the Threat Landscape Starting Point 25
Identifying RAT Activity in UK CNI Networks Starting Point 25