This lab is a walkthrough of Velociraptor UEFI visibility and simulation on how we would deploy capability to detect BlackLotus from a technical detection article.
VM with UEFI installed. I have also added a task below to walk through this process.
VM with internet access and Velociraptor available on the desktop to run as per Lab: GUI mode walk through.
Artifact Exchange content has been imported into your Velociraptor instance - Lab: GUI mode walk through
Take a snapshot of your VM to enable rollback : We are going to run malware and its much easier to simply roll back at the end of the lab.
Open cmd, browse to desktop and run: velociraptor .exe gui -–datastore=./VRdata -v
The Velociraptor GUI is configured to open automatically upon start, but the credentials are available below:
https://127.0.0.1:8889/
admin
password