Registration Landing page text

What is the real name of 3.exe? (Hint: It has been changed and can be found in an event log)

You’ve signed up for the workshop, you've studied to the data, and you've even gotten your hands dirty. Now is the time to put your knowledge to the ultimate test!

The data you've been provided during the workshop contains several command and control examples that you have had a chance to observe and hunt for. In the data there exists another technique that falls under initial access. Hunt through the data and see if you can find it!

For those that successfully answer the questions, you will be awarded the Cyborg Security Threat Hunting badge for Command and Control (Level 1).

How Do You Claim Your Badge?

The data is already imported into your Elastic instance during set up - all you have to do is begin your hunt!

REMEMBER: You can submit as many times as you like!


Your Instructors

Lee Archinal

Senior Threat Hunter and Content Developer, Intel 471

Lee is a U.S. Army veteran. While enlisted he worked as a network administrator in a wide variety of conditions. Since leaving the military he has been working in the private sector as a threat hunter and incident responder. At Cyborg Security, Lee is responsible for developing cutting edge hunting and detection content for the HUNTER platform.

Jorge Rodriguez

Director of Malware, Intel 471

As the director of the malware research team within the Intel 471 Malware Intelligence team, Jorge dissects malware internals and communication protocols to automate malware tracking. This approach allows us to receive in real-time full malware configurations, plugins, additional payloads and other commands issued, enabling real-time detection and tracking capabilities.