$10K on the line! Join our first on-site live CTF and compete for the prize. Learn more →

Malware Busters!

You are presented with an unknown and odd binary in a compromised environment.

Your job is to analyze the binary as best you can. Your analysis should include:

* Describe the actions performed by the malware.

* Find the C2 server the malware communicates with.

* Decrypt the malware's C2 protocol.

By following these steps you will find the hidden flag to complete the challenge.

Good luck!

Gili Tikochinski Avatar

Author

Gili Tikochinski

"You can do anything with regex (and maybe IDA and python)"

Terminal