Briefing
Greetings, Special Agent.
We have received intelligence that a hacker group known as the Shadow Syndicate has been developing very advanced malware. This group has been responsible for a number of high-profile cyber attacks in the past, and we believe they are planning to launch another one soon. Your mission is to examine one of the samples of their malware that we have obtained. We believe that it contains clues about their plans and capabilities, and we need you to find out as much as you can about it. You will be working with a team of experts to analyze the sample and extract any useful information.
We need you to be thorough and detail-oriented, as every piece of information could be crucial in stopping the Shadow Syndicate. Itโs imperative to figure out exactly what they are capable of and discover their intentions based on the malware sample. We are counting on you to help us take down this dangerous group and prevent them from causing any more harm. Pay extra attention on this one, as you are working with a live malware sample.
As always, Special Agent, the Contract is yours, if you choose to accept.
Materials
WARNING, ACTUAL MALWARE.
Answer Instruction
Use the answer to unlock the flagfile, this will reward you with your badge.
You will know it when you see it.
Flagfile
Be advised, the flagfile is an encrypted ZIP. Make sure your OS supports the ZIP format. Ensure the password contains no hidden characters or formatting, paste in Notepad first if the password doesn’t seem to work.
PS: Don’t forget to claim your Coins and XP, by posting your card in the #card-brag channel in Discord.
Official Write-up
Provided here is the official write-up, it does contain the answer. Use this if you’re stuck, or want to verify if you got the answer correct.
โ ๏ธ SPOILER: Official Write-up
Infectious File
The challenge involves analyzing a malware sample created by the Shadow Syndicate hacking group to extract a hidden password. The sample needs to be examined safely to discover embedded information.
Available Materials
- Malware sample file
- Context about Shadow Syndicate
- Warning about working with live malware
Safety Precautions
IMPORTANT: This challenge involves analyzing live malware. Always follow these safety protocols:
- Use a secure isolated environment (VM/sandbox)
- Disable network connectivity during analysis
- Use appropriate malware analysis tools
- Never execute the malware on your main system
- Treat all files as potentially dangerous
Solution Path
Step 1: Setup Analysis Environment
Before examining the malware:
- Set up an isolated virtual machine
- Install necessary analysis tools
- Ensure network isolation
- Create system snapshots
- Prepare monitoring tools
Step 2: Initial Analysis
Safe examination techniques:
- File hash calculation
- Static analysis
- String extraction
- Metadata examination
- Header analysis
Step 3: Password Extraction
The target password is:
Th3p@$$4th3Fl@g
Key characteristics:
- Contains special characters
- Uses number substitutions
- Case-sensitive
- No spaces
Analysis Tools
Recommended tools for safe analysis:
- Virtual Machine software
- Static analysis tools
- Hex editors
- String extraction utilities
- File analysis tools
Common Pitfalls to Avoid
- Executing malware on main system
- Missing network isolation
- Incomplete environment setup
- Overlooking string extraction
- Incorrect password copying
Best Practices
- Always work in isolation
- Document all findings
- Take system snapshots
- Use multiple analysis methods
- Verify extracted data
Verification Steps
To confirm successful extraction:
- Password matches exact format
- Special characters are correct
- Case sensitivity is preserved
- No extra spaces included
- All substitutions are correct
Additional Security Notes
- Keep analysis environment updated
- Use fresh VM for each analysis
- Monitor system behavior
- Document all changes
- Maintain proper isolation
Remember: The key to this challenge is maintaining security while effectively analyzing the malware sample. Never compromise safety protocols, even in a CTF environment.
Creator(s): Frank Diepmaat