Palo Alto's Unit42 recently conducted research on an UltraVNC campaign, wherein attackers utilized a backdoored version of UltraVNC to maintain access to systems. This lab is inspired by that campaign and guides participants through the initial access stage of the campaign.
https://app.hackthebox.com/sherlocks/Unit42


no explanation needed just filter with event code 11 (file creation) using filter current log



we can see a suspicious executable with 2 .exe extension and was executed from the downloads directory so we search its hash on VirusTotal we confirm that this executable is malicious and its reported as UltraVNC RAT