A blockchain development company detected unusual activity when an employee was redirected to an unfamiliar website while accessing a DAO management platform. Soon after, multiple cryptocurrency wallets linked to the organization were drained. Investigators suspect a malicious tool was used to steal credentials and exfiltrate funds.
Your task is to analyze the provided intelligence to uncover the attack methods, identify indicators of compromise, and track the threat actor’s infrastructure.
**https://cyberdefenders.org/blueteam-ctf-challenges/tusk-infostealer/**

523d4eb71af86090d2d8a6766315a027fdec842041d668971bfbbbd1fe826722
921.36

by searching the hash in VirusTotal and look in details will find the file size
Mammoth


searching with the hash i start looking at the reports and find the answer in this report
https://securelist.com/tusk-infostealers-campaign/113367/

we can find the answer in the same report (other answers as well)