Challenge
By this point in the chapter, we've built quite the script for collecting the most common IOCs that may be utilized by commodity malware. Now it is time to put your knowledge to the test! I encourage you to do this exercise manually first – timing yourself, and then complete it using the script we have created to see the difference.
Utilizing the malware sample link included at the beginning of this chapter, attempt to answer the following questions, courtesy of the WIZARD SPIDER adversarial group:
- What persistence mechanisms were utilized by this sample?
- How many files did the sample write? Where, and what, are their SHA256 hashes?
- Is there any hidden data?
- How could you alter your script to not only return the malware and persistence, but remove it?