Skip to main content
APT Investigation: Bluebottle Financial Sector Campaign operation cover
AdvancedSIEMXDRFirewallPRO

APT Investigation: Bluebottle Financial Sector Campaign

A deep-dive investigation into a sophisticated multi-stage attack targeting financial institutions in Francophone Africa. Analysts will trace the infection from malicious ISO mounts through GuLoader execution, defense evasion via signed kernel drivers, and lateral movement using dual-use tools like Ngrok and PsExec. This scenario is based on real-world threat intelligence from the Symantec Threat Hunter Team regarding the Bluebottle/OPERA1ER group.

3h
28 tasks
320 points
Pro

Start this operation

Requires a Pro subscription.

View Pro Plans

Free forever โ€” no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Initial Lure Execution Analysis

10
SOC{filename.exe}Hint available
2

GuLoader Injection Detection

10
SOC{process_name.exe}Hint available
3

Kernel Driver Defense Evasion

15
SOC{service_name}Hint available
4

Lateral Movement via PsExec

10
SOC{hostname}Hint available
5

Ngrok Tunneling Correlation

10
SOC{domain_name}Hint available
6

RDP Persistence Mechanism

10
SOC{tool_name}Hint available
7

Credential Theft Pattern Analysis

10
SOC{RegistryValueName}Hint available
8

Malicious .NET Download Source

10
SOC{ip_address}Hint available
9

Macro Execution Parent Process

10
SOC{PROCESS.EXE}Hint available
10

Encrypted Payload Retrieval

10
SOC{filename.bin}Hint available
11

Registry Persistence Mechanism

10
SOC{KeyName}Hint available
12

NetWire C2 Port Identification

10
SOC{port_number}Hint available
13

Brute Force Source Correlation

20

Identify the external IP address responsible for multiple failed RemoteInteractive logon attempts against the workstation FIN-WS-06, as recorded in the security event logs.

SOC{...}
14

Phishing Document Source Domain

10
SOC{domain.com}Hint available
15

GuLoader Binary Name

10
SOC{filename.exe}Hint available
16

C2 Domain Correlation

10
SOC{domain.name}Hint available
17

C2 Server IP Identification

15
SOC{ip_address}Hint available
18

Script Interpreter Analysis

10
SOC{binary.exe}Hint available
19

RAT Payload Hosting

15
SOC{http://url/path}Hint available
20

Reflective Loading Detection

15
SOC{InjectionType}Hint available
21

Sandbox Evasion Check

15
SOC{APICall}Hint available
22

Cobalt Strike Beacon Detection

10
SOC{process.exe}Hint available
23

RDP Lateral Movement Source

10
SOC{ip_address}Hint available
24

Unauthorized Data Transfer

10
SOC{ip_address}Hint available
25

Phishing Attachment Filename

10
SOC{filename.doc}Hint available
26

Suspicious Notepad Injection

10
SOC{Malware.exe}Hint available
27

Encrypted C2 Traffic Analysis

10
SOC{protocol_name}Hint available
28

Keylogging Activity Correlation

15
SOC{TXXXX.XXX}Hint available

28 tasks ยท 320 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
XDR log analysis
Firewall log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Advanced

Complex multi-stage investigations. Realistic noise, ambiguous indicators, lateral movement.

Prerequisites

  • Basic understanding of security alerts
  • Experience with log analysis tools
  • Familiarity with SIEM concepts
  • Familiarity with XDR concepts
  • Familiarity with Firewall concepts

Ready to investigate?

This operation requires a Pro subscription.

View Pro Plans

Free forever โ€” no credit card required

More Operations

View all

We use cookies to improve your experience and measure usage. Learn more