TeamSpy Challenge
Credit
This lab is made by CyberDefenders.
Lab Scenario
“An employee reported that his machine started to act strangely after receiving a suspicious email with a document file. The incident response team captured a couple of memory dumps from the suspected machines for further inspection. As a soc analyst, analyze the dumps and help the IR team figure out what happened!”
Downloading the Memory Dump
Attention: the sample you are about to download is including malicious files and malware samples. To protect your system, please analyze it on a completely isolated virtual machine.
Please visit the lab official link to download it.
Used Tools
Instructions
“Uncompress the lab (pass: cyberdefenders.org)”
Conclusion
In this blog, I briefly notified you about a newly released memory forensic challenge.
~ Cya in the Next One