Student: Tapiwanashe Mlambo
Room Link: https://tryhackme.com/room/threatinteltools
π§ Introduction
In this room, I explored foundational threat intelligence concepts and practiced using publicly available tools for gathering Indicators of Compromise (IOCs), analyzing malware infrastructure, and understanding attacker behavior.
Rather than theoretical intel only, the tasks emphasized practical threat hunting β using services like Abuse.ch, urlscan.io, and Ciscoβs Talos Intelligence β all tools relied on by SOC analysts, incident responders, and blue teamers in real-world environments.
π What I Learned
πΉ Threat Intelligence Types
- Strategic Intel: Long-term risk analysis for business decisions
- Tactical Intel: Adversary TTPs β useful for improving detection systems
- Technical Intel: Low-level artefacts like IPs, hashes, and domain names
- Operational Intel: Intelligence around specific planned or ongoing attacks
πΉ Key Questions Intel Answers:
- Whoβs attacking?
- Why are they targeting us?
- What are they using?
- How can we detect and respond?
π οΈ Tools & Practical Exercises
π 1. URLScan.io
Purpose: Analyze a suspicious domain or link by watching how it behaves when loaded in a browser.
Task: Searched a suspicious domain to observe all the requests it makes, third-party connections, and how many external assets are loaded.
What I Learned:
- Even legitimate-looking domains may load resources from shady subdomains.
- URLScan helps identify phishing campaigns or malware delivery platforms by showing hidden redirects and scripts.
πΈ URLScan report for tryhackme.com
π 2. Abuse.ch Platforms
Abuse.ch is an open-source intelligence project focused on malware, botnets, and C2 infrastructure. I explored several of their tools:
β a. ThreatFox
- Task: Searched IOC
212.192.246.30:5555
- Finding: This IP is flagged as a malware C2 server, linked to botnet activity.
Insight: ThreatFox maps IOCs to known malware families β useful for identifying malicious infrastructure before an attack escalates.
πΈ ThreatFox IOC details with malware label
β b. SSL Blacklist (SSLBL)
- Task: Queried JA3 fingerprint
51c64c77e60f3980eea90869b68c58a8
- Finding: Identified as a malicious SSL fingerprint used by multiple malware variants.
Insight: Attackers often reuse JA3 signatures β tracking SSL fingerprints can detect encrypted C2 traffic without decrypting it.
πΈ SSLBL JA3 fingerprint result
β c. URLHaus
- Task: Searched recent URLs associated with malware distribution
- Observation: Found several payload delivery sites using legitimate-looking domains (typosquatting).
πΈ URLHaus database entry
β d. Feodo Tracker
- Task: Browsed active C2 servers for Emotet, Dridex, and Trickbot
- Use Case: Helpful for updating firewall and proxy blocklists in real-time.
πΈ Feodo Tracker C2 list
π§ 3. PhishTool
Task: Analyzed email headers and content to detect phishing tactics
- Checked SPF/DKIM validation
- Reviewed sender reputation and link behavior
- Flagged suspicious attachments
Key Takeaway: PhishTool helps automate phishing email triage and enables defenders to respond faster.
π‘οΈ 4. Talos Intelligence (Cisco)
Task: Checked reputation of domains and IPs
- Queried known phishing links
- Compared results with ThreatFox and URLHaus
Why It Matters: Talos combines Cisco telemetry with public data. Using multiple sources increases IOC confidence.
πΈ Talos domain or IP reputation report
π§ͺ Scenario-Based Tasks
π Scenario 1: Malware Hash Lookup
- Step 1: Found the file hash from the malicious attachment
- Step 2: Queried hash on VirusTotal
- Result: Confirmed malware classification, including AV detection names and behavior signatures
πΈ VirusTotal scan result
π Key Insights & Reflections
- Correlation is Key: No single tool is enough β real power lies in cross-referencing findings across platforms (ThreatFox + Talos + URLHaus = more confidence).
- Threat Intel Is Continuous: Indicators change fast. Tools like Feodo Tracker update daily β automation is critical for staying ahead.
- Real-World Application: I can use these tools in incident response, phishing analysis, or as part of SOC workflows.
β Final Thoughts
This room helped bridge theory with practice. It felt less like a simulation and more like hands-on analyst work β exploring actual malware, IOCs, and using the same tools professionals use in the field.
ποΈ References
- TryHackMe Room: Threat Intelligence Tools
- Urlscan.io
- Abuse.ch β URLHaus, SSLBL, Feodo Tracker, ThreatFox
- PhishTool
- Talos Intelligence
- VirusTotal