Scenario

A decentralized finance (DeFi) platform recently reported multiple user complaints about unauthorized fund withdrawals. A forensic review uncovered a phishing site impersonating the legitimate PancakeSwap exchange, luring victims into entering their wallet seed phrases. The phishing kit was hosted on a compromised server and exfiltrated credentials via a Telegram bot.

Your task is to conduct threat intelligence analysis on the phishing infrastructure, identify indicators of compromise (IoCs), and track the attacker’s online presence, including aliases and Telegram identifiers, to understand their tactics, techniques, and procedures (TTPs).

https://cyberdefenders.org/blueteam-ctf-challenges/grabthephisher/


1- Which wallet is used for asking the seed phrase?

Metamask

Screenshot 2025-07-09 080637.png

we opened the file and that what we see . we know we are investigating a phishing kit used to build a phishing site impersonating a crypto site to steal crypto wallets then exfiltrating the credentials via telegram bot

as for the question we see Metamask

i didn’t know at first but after some search about crypto wallets and i found that Metamask is a complimentary cryptocurrency wallet application

2- What is the file name that has the code for the phishing kit?

metamask.php

Screenshot 2025-07-09 081714.png

Screenshot 2025-07-09 081835.png

in the metamask folder we found a php file

3- In which language was the kit written?

PHP

4- What service does the kit use to retrieve the victim's machine information? Sypex Geo

Screenshot 2025-07-09 082015.png

Screenshot 2025-07-09 082337.png

looking at the code we see it initiates a request to **http://api.sypexgeo.net/json/** to get location and date