Version
By |
Version |
Comment |
noraj |
1.0 |
Creation |
CTF
Description
Submit: WhiteHat{SHA1(flag)}
http://material.grandprix.whitehatvn.com/gp2016/For02_3603cb82230e3f6eb669a65f455e92b74659c2cc.zip
http://bakmaterial.grandprix.whitehatvn.com/gp2016/For02_3603cb82230e3f6eb669a65f455e92b74659c2cc.zip
Alternative server on amazon in case of low traffic:
http://54.183.97.137/gp2016/For02_3603cb82230e3f6eb669a65f455e92b74659c2cc.zip
Solution
TL;DR: incomplete write-up.
- Download the zip.
- Extract it.
- We have a raw image.
- Let's see what we can do with Volatility:
- See a supicious
keylog.exe
so we dumped it.
- Upload it to Virustotal and to Hybrid Analysis.
- Detection ratio: 4 / 56, a keylogger.
- Just look for quick win:
- The malware is saving its collected information in
c:/windows/keylog.log
.
- Let's find the file and dump it:
- But this is a non standard encoding:
- This is nor UTF-8, nor WINDOWS-1252/C1252.
- Try to determine what kind of encoding this is (source: superuser.com):
- Let's take a look at results:
- Tried UTF-16, UNICODELITTLE, UNICODE, LATIN1, ISO-8859-1 WINDOWS-1251, CP1251 with
iconv
.
- Tried
enca
recognition:
- Tried
chardet
(not even a relevent output):
Submit