TryHackMe — Boogeyman 2 Challenge Walkthrough
Common Information
Type Value
UUID 56e41edb-df13-4cbd-a28e-c3ee8339fdcf
Fingerprint 24690d912da45410
Analysis status DONE
Considered CTI value -2
Text language
Published Oct. 27, 2024, 11:02 p.m.
Added to db Oct. 28, 2024, 12:12 a.m.
Last updated Nov. 17, 2024, 8:43 p.m.
Headline TryHackMe — Boogeyman 2 Challenge Walkthrough
Title TryHackMe — Boogeyman 2 Challenge Walkthrough
Detected Hints/Tags/Attributes 54/3/21
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 167 Cybersecurity on Medium https://medium.com/feed/tag/cybersecurity 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 303
tryhackme.com
Details Domain 89
vol.py
Details Domain 1
files.boogeymanisback.lol
Details Domain 4127
github.com
Details Domain 360
attack.mitre.org
Details File 1
role.eml
Details File 1
name-of-attachment-q3.doc
Details File 1
wkstn-2961.raw
Details File 85
vol.py
Details File 25
windows.ps
Details File 18
windows.pst
Details File 1
redacted.dmp
Details Github username 15
decalage2
Details Github username 10
volatilityfoundation
Details MITRE ATT&CK Techniques 275
T1053.005
Details MITRE ATT&CK Techniques 480
T1053
Details Url 1
https://tryhackme.com/r/room/boogeyman2
Details Url 4
https://github.com/decalage2/oletools/wiki/olevba
Details Url 2
https://github.com/volatilityfoundation/volatility3
Details Url 2
https://github.com/volatilityfoundation/volatility/wiki/command-reference
Details Url 6
https://attack.mitre.org/techniques/t1053/005