|| Date: 18-12-29 || Back to index ||
|| Tag: write-up ||

Sectalks BER0x02 Write-up

This CTF occurred in Berlin’s N26 office. It was hosted by nobe4 and the CTF was made by yours truly.

Overview

Challenge #1: randomware

Questions

  1. What type of ELF file is this?
  2. What is the value of Elf64_Ehdr.e_version in this file?
  3. What is the segment type that contains the section .init_array?
  4. What is the virtual address of the entrypoint of the binary?
  5. What is the decryption key?
  6. What algorithm is used for encryption?

Challenge #2: malificent.exe

Questions

  1. For section .rsrc, how much space does this section occupy on disk?
  2. What is the virtual address of the first code that executes in this binary?
  3. What is the total amount of memory this binary will reserve in process memory?
  4. When was this program compiled?
  5. Do any imports hint at this program’s functionality? If so, which imports are they and what do they tell you?
  6. What host- or network-based indicators could be used to identify this malware on infected machines?
  7. This file has one resource in the resource section. What is it?

Write-up

Challenge #1: randomware

  1. What type of ELF file is this?
  2. What is the value of Elf64_Ehdr.e_version in this file?
  3. What is the segment type that contains the section .init_array?
  4. What is the virtual address of the entrypoint of the binary?
  5. What is the decryption key?
  6. What algorithm is used for encryption?

Challenge #2: malificent.exe

  1. For section .rsrc, how much space does this section occupy on disk?
  2. What is the virtual address of the first code that executes in this binary?
  3. What is the total amount of memory this binary will reserve in process memory?
  4. When was this program compiled?
  5. Do any imports hint at this program’s functionality? If so, which imports are they and what do they tell you?
  6. What host- or network-based indicators could be used to identify this malware on infected machines?
  7. This file has one resource in the resource section. What is it?