DetectLog4j
For the last week, log4shell vulnerability has been gaining much attention not for its ability to execute arbitrary commands on the vulnerable system but for the wide range of products that depend on
Q1 What is the computer hostname?

Q2 What is the Timezone of the compromised machine?



Q3 What is the current build number on the system?


Q4 What is the computer IP?

Q5 What is the domain computer was assigned to?

Q6 When was myoussef user created?
Q7 What is the user mhasan password hint?

Q8 What is the version of the VMware product installed on the machine?


Q9 What is the version of the log4j library used by the installed VMware product?

Q10 What is the log4j library log level specified in the configuration file?

Q11 The attacker exploited log4shell through an HTTP login request. What is the HTTP header used to inject payload?
Q12 The attacker used the log4shell.huntress.com payload to detect if vcenter instance is vulnerable. What is the first link of the log4huntress payload?

Q13 When was the first successful login to vsphere WebClient?

Q14 What is the attacker's IP address?

Q15 What is the port the attacker used to receive the cobalt strike reverse shell?


Q16 What is the script name published by VMware to mitigate log4shell vulnerability?

Q17 In some cases, you may not be able to update the products used in your network. What is the system property needed to set to 'true' to work around the log4shell vulnerability?

Q18 What is the log4j version which contains a patch to CVE-2021-44228?

Q19 Removing JNDIlookup.class may help in mitigating log4shell. What is the sha256 hash of the JNDILookup.class?



Q20 Analyze JNDILookup.class. What is the value stored in the CONTAINER_JNDI_RESOURCE_PATH_PREFIX variable?
Q21 What is the executable used by the attacker to gain persistence?


Q22 When was the first submission of ransomware to virustotal?

Q24 What is the ISP that owns that IP that serves the text file?
Q25 The ransomware check for extensions to exclude them from the encryption process. What is the second extension the ransomware checks for?

Last updated



