We covered a cyber threat intelligence case study that involved a finance company named SwifSpend financ that reported malicious samples spread in its network. We took on the shoes of a cyber threat intelligence analyst and looked into the indicators of compromise provided in the report. We extracted intelligence related to the samples including URLs, hashes, IP addresses and the MITRE ATT&CK techniques used by the attackers. This was part of TryHackMe Friday Overtime SOC Level 2 track.
Writeup can be found here.
Video is here