Benjamin Taylor

Holmes CTF: “The Card” 🃏

👤 Author: Benjamin Taylor (@benjqminn)

🤝 Team: Sherlock’s Homies

🏆 Ranking: 634 / 7,085 teams

📝 Prompt: Holmes receives a breadcrumb from Dr. Nicole Vale - fragments from a string of cyber incidents across Cogwork-1. Each lead ends the same way: a digital calling card signed JM.

📌 Summary: Multi-stage web attack against Nicole Vale’s honeypot attributed to actor “JM”: initial reconnaissance (distinct User-Agent), WAF bypass with web shell deployment, database exfiltration, malware persistence, and infrastructure mapping via Cogwork platforms.

🟩 Challenge Difficulty: EASY


📋 TL;DR (Answers)


🚩 Flag 1: First User-Agent

Question: Analyze the provided logs and identify what is the first User-Agent used by the attacker against Nicole Vale’s honeypot.

Walkthrough:

First User Agent Solution Line of access.log:

Answer: Lilnunc/4A4D - SpecterEye


🚩 Flag 2: Web Shell Deployment

Question: It appears the threat actor deployed a web shell after bypassing the WAF. What is the file name?

Walkthrough:

WAF Solution Line of waf.log:

Answer: temp_4A4D.php


🚩 Flag 3: Database Exfiltration

Question: The threat actor also managed to exfiltrate some data. What is the name of the database that was exfiltrated?

Walkthrough:

Exfiltration Database Solution Line of access.log:

Answer: database_dump_4A4D.sql


🚩 Flag 4: Recurring String

Question: During the attack, a seemingly meaningless string seems to be recurring. Which one is it?

Walkthrough:

Meaningless String

Answer: 4A4D


🚩 Flag 5: Campaigns Linked

Question: OmniYard-3 … count how many campaigns appear to be linked to the honeypot attack.

Walkthrough:

Campaign Graph

Answer: 5


🚩 Flag 6: Tools + Malware

Question: How many tools and malware in total are linked to the previously identified campaigns?

Walkthrough:

Campaign Graph Entities

Answer: 9


🚩 Flag 7: SHA-256 Hash

Question: The threat actor has always used the same malware in their campaigns. What is its SHA-256 hash?

Walkthrough:

4A4D Search

4A4D Graph

Indicator Hash

SHA-256 Hash

Answer: 7477c4f5e6d7c8b9a0f1e2d3c4b5a6f7e8d9c0b1a2f3e4d5c6b7a8f9e0d17477


🚩 Flag 8: C2 IP Address

Question: Use the CogWork Security Platform to look for the hash and locate the IP address to which the malware connects.

Walkthrough:

Search Query SHA-256

View Details SHA-256

Answer: 74.77.74.77


🚩 Flag 9: Persistence File Path

Question: What is the full path of the file that the malware created to ensure its persistence on systems?

Walkthrough:

File Operations

Answer: /opt/lilnunc/implant/4a4d_persistence.sh


🚩 Flag 10: Open Ports

Question: CogNet Scanner — how many open ports does the server have?

Walkthrough:

CogNet Scanner

Detailed Breakdown

Answer: 11


🚩 Flag 11: Organization

Question: Which organization does the previously identified IP belong to?

Walkthrough:

Campaign Graph Entities

Answer: SenseShield MSP


🚩 Flag 12: Cryptic Banner

Question: One of the exposed services displays a banner containing a cryptic message. What is it?

Walkthrough:

Services Tab

Suspicious Banner

Answer: He's a ghost I carry, not to haunt me, but to hold me together - NULLINC REVENGE


Next challenge writeup: Holmes — The Watchman’s Residue 👮