TryHack3M: Bricks Heist

Mohamed Ali
2 min readAug 3, 2024

--

Crack the code, command the exploit! Dive into the heart of the system with just an RCE CVE as your key.

Answer

Q: What is the content of the hidden .txt file in the web folder?

Ans: THM{fl46_650c844110baced87e1606453b93f22a}

Q: What is the name of the suspicious process?

Ans: nm-inet-dialog

Q: What is the service name affiliated with the suspicious process?

Ans: ubuntu.service

Q: What is the log file name of the miner instance?

Ans: inet.conf

Q: What is the wallet address of the miner instance?

Ans: bc1qyk79fcp9hd5kreprce89tkh4wrtl8avt4l67qa

Q: The wallet address used has been involved in transactions between wallets belonging to which threat group?

Ans: LockBit

Just copy the sender’s address and search on Google:

google search for sender

One can visit any link further. (Even I visited some). But, the third one in the list has something juicy:

threat group reveal

Finally, it shows the link of LockBit Ransomware Group with this wallet.

Find Me

I look forward to seeing you again soon

--

--

Mohamed Ali
Mohamed Ali

No responses yet