|
What is the encryption key
|
Forensics |
20 |
|
|
What is the filename of the ransomware launched by the attackers
|
Forensics |
50 |
|
|
What is the path of the original implant
|
Forensics |
20 |
|
|
Find the parts of the persistence flags
|
Forensics |
30 |
|
|
Mag1k
|
Mobile |
100 |
|
|
What algorithm is used to encrypt the files
|
Forensics |
20 |
|
|
What is the MITRE ATT&CK ID of the technique
|
Forensics |
10 |
|
|
Is it called login or log in
|
Mobile |
30 |
|
|
Message Received
|
Mobile |
20 |
|
|
Find the flag inside the email
|
Forensics |
10 |
|
|
What is the email used by the adversaries
|
Forensics |
10 |
|
|
What is the email address of the victim
|
Forensics |
10 |
|