Malware Busters!
You are presented with an unknown and odd binary in a compromised environment.
Your job is to analyze the binary as best you can. Your analysis should include:
* Describe the actions performed by the malware.
* Find the C2 server the malware communicates with.
* Decrypt the malware's C2 protocol.
By following these steps you will find the hidden flag to complete the challenge.
Good luck!
Author
Gili Tikochinski
"You can do anything with regex (and maybe IDA and python)"
Terminal
Terminal