|| Date: 18-12-29 || Back to index ||
|| Tag: write-up ||
Sectalks BER0x02 Write-up
This CTF occurred in Berlin’s N26 office. It was hosted by nobe4 and the CTF was made by yours truly.
Overview
Challenge #1: randomware
- Link: github.com/sectalks
- Live Ransomware!!!
- Made by MalwareCheese
- Has two versions
- With debug symbols (easy)
- Stripped (hard)
Questions
- What type of ELF file is this?
- What is the value of
Elf64_Ehdr.e_version
in this file?
- What is the segment type that contains the section
.init_array
?
- What is the virtual address of the entrypoint of the binary?
- What is the decryption key?
- What algorithm is used for encryption?
Challenge #2: malificent.exe
Questions
- For section
.rsrc
, how much space does this section occupy on disk?
- What is the virtual address of the first code that executes in this binary?
- What is the total amount of memory this binary will reserve in process memory?
- When was this program compiled?
- Do any imports hint at this program’s functionality? If so, which imports are they and what do they tell you?
- What host- or network-based indicators could be used to identify this malware on infected machines?
- This file has one resource in the resource section. What is it?
Write-up
Challenge #1: randomware
- What type of ELF file is this?
- What is the value of
Elf64_Ehdr.e_version
in this file?
- What is the segment type that contains the section
.init_array
?
- What is the virtual address of the entrypoint of the binary?
0x00001200
. Taken from rabin2 -ee randomware
- What is the decryption key?
bunnyfoofoo
. Its also the encryption key
- What algorithm is used for encryption?
Challenge #2: malificent.exe
- For section
.rsrc
, how much space does this section occupy on disk?
- What is the virtual address of the first code that executes in this binary?
- What is the total amount of memory this binary will reserve in process memory?
- OptionalHeader.SizeOfImage: 0x6000
- When was this program compiled?
- According to the file header, this program was compiled in
August 2019
. Clearly, the compile time is faked, and we can’t determine when the file was compiled.
- NOTE: This binary was made found in 2012.
- Do any imports hint at this program’s functionality? If so, which imports are they and what do they tell you?
- The imports from
advapi32.dll
indicate that the program is doing something with permissions. The imports from WinExec and WriteFile tell us that the program writes a file to disk and then executes it. There are also imports for reading information from the resource section of the file.
- What host- or network-based indicators could be used to identify this malware on infected machines?
- The string
\system32\wupdmgr.exe
indicates that this program could create or modify a file at that location. The string www.malwareanalysisbook.com/updater.exe
probably indicates where additional malware is stored, ready for download.
- This file has one resource in the resource section. What is it?