Loggy

Janice from accounting is beside herself! She was contacted by the SOC to tell her that her work credentials were found on the dark web by the threat intel team. We managed to recover some files from her machine and sent them to the our REM analyst.
Goto Lab

Continuing my cybersec journey on new year 2025 with some simple CTF machines and exploring in the field of malware analysis labs.

Lets solve some questions:

  1. What is the SHA-256 hash of this malware binary?
    6acd8a362def62034cbd011e6632ba5120196e2011c83dc6045fcb28b590457c
    
  2. What programming language (and version) is this malware written in?

    Looking at the string contents within the sample, image5

     Golang Golang 1.22.3
    
  3. There are multiple GitHub repos referenced in the static strings. Which GitHub repo would be most likely suggest the ability of this malware to exfiltrate data?

    Looking at the string contents within the sample,

    image2

    After realizing, WTF I was doing, I try to visualize the ASM and workflow using Binary Ninja tool.

    image4

     github.com/jlaffaye/ftp
    
  4. What dependency, expressed as a GitHub repo, supports Janice’s assertion that she thought she downloaded something that can just take screenshots?

    Further scrolling the code within Ninja tool, i got the repo info:

     github.com/kbinani/screenshot
    
  5. Which function call suggests that the malware produces a file after execution?

    I was looking at the API calls, just to get idea of what has been done, and from the name itself we can know what API call is used to create a file. image3

  6. You observe that the malware is exfiltrating data over FTP. What is the domain it is exfiltrating data to?

    As already mentioned above for the FTP using Binary Ninja, the domain exfiltration is done in:

     gotthem.htb
    
  7. What are the threat actor’s credentials?

    Binary ninja has been the savior for this lab 😂. image6

     NottaHacker:Cle@rtextP@ssword
    
  8. What file keeps getting written to disk?
     keylog.txt
    
  9. When Janice changed her password, this was captured in a file. What is Janice’s username and password?

    Asking AI for arranging Janice Credentials 🤔: image7

     Janice:PASSWORD123
    

    It was an easy box with some content analyzing within sample file.