Walkthrough on the use of MISP as a Threat Sharing Platform

Cyber Rey
2 min readNov 1, 2023
MISP — Malware Information Sharing Platform TryHackme Walkthrough

This write-up covers the MISP Room on TryHackMe.
Learning Path (s): Cyber Defense, SOC Level 1
Module: Threat & Vulnerability Management, Cyber Threat Intelligence
Skill: Malware Research and detection Tool, Threat Intelligence

MISP — Malware Information Sharing Platform: Sharing of structured threat information among security analysts, malware researchers, etc

MISP is effectively useful for the following use cases:

  • Malware Reverse Engineering: Sharing of malware indicators to understand how different malware families function.
  • Security Investigations: Searching, validating and using indicators in investigating security breaches.
  • Intelligence Analysis: Gathering information about adversary groups and their capabilities.
  • Law Enforcement: Using indicators to support forensic investigations.
  • Risk Analysis: Researching new threats, their likelihood and occurrences.
  • Fraud Analysis: Sharing of financial indicators to detect financial fraud.

Room Questions

Note: Due to Medium’s formatting, some elements are dropped. Please visit our Notion page for the full tutorial.

Setting up: Connect to the TryhackMe VM and Spawn the machine or Connect to THM’s network via OpenVPN

5.1 What event ID has been assigned to the PupyRAT event?

  • Go to home and click on List events. In the filter search box, type in PupyRat.

5.2 The event is associated with the adversary gaining ______ into organizations.

  • Look at the tags to find the answer.

5.3 What IP address has been mapped as the PupyRAT C2 Server?

  • Scroll down in the event and look for ip-dst.

5.4 From the Intrusion Set Galaxy, what attack group is known to use this form of attack?

  • No specific steps provided.

5.5 There is a taxonomy tag set with a Certainty level of 50. Which one is it?

  • Click on Event actions -> list taxonomies -> search for certainty.

--

--

Cyber Rey
Cyber Rey

Written by Cyber Rey

Experienced Cybersecurity Professional, proficient in Cloud Security (AWS & Azure), Vulnerability Assessment and Penetration testing (VAPT), IT administration.

No responses yet