Infectious File

POPULARITY – 2,872 views

Jamal sat in the dimly lit basement of his parents’ house, hunched over his computer. He was a hacker, and he was writing some of the most advanced malware the world had ever seen.

He had always been fascinated by computers and technology, and had spent years learning everything he could about hacking and coding. And now, finally, he was putting all of that knowledge to use.

As he worked, Jamal’s fingers moved across the keyboard with lightning speed. He was completely focused, completely immersed in his work. He was in a zone, and nothing could distract him.

He knew that what he was doing was illegal, and that there were serious consequences if he was caught. But he didn’t care. He was driven by a desire to push the boundaries, to see just how far he could go.

Finally, after hours of intense work, the malware was complete. Jamal sat back in his chair and let out a sigh of relief. It had been a long and difficult process, but it had all been worth it.

Now it was time to send the malware to his boss, Mr Reaper. Mr Reaper was the leader of a group of hackers known as the Shadow Syndicate, and Jamal was one of their top operatives.

Jamal carefully packaged the malware and sent it off to Mr Reaper, along with a detailed report on how it worked. He knew that Mr Reaper would be pleased with his work, and he couldn’t wait to see what the Shadow Syndicate would do with it.

A few days later, Jamal received a message from Mr Reaper. “Excellent work, Jamal,” it read. “The malware is even more advanced than I had hoped. We’ll put it to good use. Keep up the good work.”

Jamal couldn’t help but feel a sense of pride and accomplishment. He had done something that few others would have the courage to do, and he knew that he had made a real difference.

From that day on, Jamal continued to work for the Shadow Syndicate, using his skills and knowledge to help them achieve their goals. And though he knew that it was dangerous work, he couldn’t help but feel a sense of excitement and purpose. This was where he belonged, and he knew that he would always be remembered as one of the greatest hackers of all time.


Greetings Special Agent K. We have received intelligence that a hacker group known as the Shadow Syndicate has been developing very advanced malware. This group has been responsible for a number of high-profile cyber attacks in the past, and we believe they are planning to launch another one soon.

Your mission is to examine one of the samples of their malware that we have obtained. We believe that it contains clues about their plans and capabilities, and we need you to find out as much as you can about it.

You will be working with a team of experts to analyze the sample and extract any useful information. We need you to be thorough and detail-oriented, as every piece of information could be crucial in stopping the Shadow Syndicate.

It’s imperative to figure out exactly what they are capable of and discover their intentions based on the malware sample. We are counting on you to help us take down this dangerous group and prevent them from causing any more harm.

Pay extra attention on this one, as you are working with a live malware sample.

As always, Special Agent K. The Contract is yours, if you choose to accept.

Materials and Answer Instruction

WARNING!!! The “infectious file” is a REAL MALWARE SAMPLE. Download at your own risk. Advice to use a Virtual Machine for interacting with the file. Hacktoria is not responsible for any consequences of your own actions.

Download the Infectious File

Download the Flagfile

Write-ups: Infectious File


Submit your own write-ups via this page: