๐ŸŒš
W3LC0M3
  • ๐Ÿ‘จโ€๐ŸณWelcome
  • ๐Ÿ–ฒ๏ธHacker Boy
    • ๐Ÿดโ€โ˜ ๏ธCTF's (challenges)
      • Crypto
        • Links
      • Pwn
        • Concepts
        • Links
        • Tryhackme: Intro to pwntools notes
      • Forensics
        • Volatitily
    • ๐ŸTryhackMe
      • Boxes
        • ๐Ÿ‘„biteme
    • ๐Ÿ“ฆHackTheBox
      • Challenges
        • Templated
        • Phonebook
        • Weather App
        • LoveTok
        • Toxic
      • Boxes
    • ๐Ÿค–Android Hacking
      • Hacking Android Notes
      • Android Hacking 101 - Tryhackme Notes
      • Tools
      • Useful Commands
      • Android Books
      • Hack the box - Mobile Challenges Notes
        • Don't Overreact Challenge Notes
      • Hacker101 Android Challenges notes
      • Crackme Challenge Notes
      • Android Application Basics Notes
      • Other References
    • ๐ŸชŸWindows PenTest Notes
    • ๐Ÿฆนโ€โ™‚๏ธServices Pentest Notes
    • ๐Ÿ““Vuln notes
    • ๐ŸงฐMy Pentest Tools
  • ๐Ÿ™‰Learny Boy
    • ๐Ÿ‘จโ€๐ŸซMy Projects
      • โ›๏ธMinero
        • Links
      • ๐ŸšRice
        • Debian Ricing
        • Shell
    • ๐Ÿง‘โ€๐Ÿš€Learning Stuff...
      • ๐ŸงLinux Fundamentals
      • ๐ŸŽ‡Network Enumeration with nmap
      • ๐Ÿ’พBinary Reverse Engineering
        • ๐Ÿ‡ฌ๐Ÿ‡ฎReverse Engineering with Ghidra
          • ๐Ÿฆ†Evil Duck Hunt
Powered by GitBook
On this page
  1. Learny Boy
  2. Learning Stuff...
  3. Binary Reverse Engineering
  4. Reverse Engineering with Ghidra

Evil Duck Hunt

Assignment 2 of Reverse Engineering.

Seems like a client of ours from Germany just got his laptop infected with a malware. The laptop was almost clean, except for a game (the application we suspect to have the malware), and a couple of pictures. Our colleague is very fond on the pictures, as he loves ducks, and he wishes to get them back. Can you help?

This also constitutes a great exercise for you reversing skills.

We need to know:

  • Do we really have a malware?

  • How the malware works?

  • What the malware does to the system.

  • Should we be worried about it spreading to other hosts?

  • Do we have a beacon?

  • Was any information exfiltrated?

Describe the strategies you follow (tracers, logs, static and dynamic analysis), assumptions, dead ends, tools used, features of the malware, and if possible, provide a clear reconstruction of the events, and of the major algorithms. Include screenshots whenever relevant.

Also, if possible, recover the pictures! Iโ€™m not sure the pictures are worth the amount requested, or if they can be recovered without paying, but our colleague is desolated.

As always: Be careful and do not trust this file. Use VMs, sandboxes or other confinement strategies.

Included you can find the malware and a folder with encrypted files, as they were in the laptop. The laptop was running Debian sid 64bits.

NOTE: You will need at least openssl lib, libgtk-3 and libwebkit2gtk.

PreviousReverse Engineering with Ghidra

Last updated 2 years ago

๐Ÿ™‰
๐Ÿง‘โ€๐Ÿš€
๐Ÿ’พ
๐Ÿ‡ฌ๐Ÿ‡ฎ
๐Ÿฆ†