MalWhere?

Honourable Mention
ad3n - for helping me and solving this challenge. Kudos!
Solution
Given us a .exe file that is not a malwere, but Antivirus detects it as a malwere because this file using some functions that are commonly seen in a malware, says the author.
If that being said, we start our static analysis with reading the file's strings.

We can see a powershell script being executed upon running the executable.
We notice that are a something hiding inside the base64 encoding, so we develop a .py script to decode it and it looks like this.
So we had a readable function that calculates an ASCII values and append it together.

Again, develop a script to calculate the ASCII value for variable $op and $ra.
So we got the strings that we wanted, turns out that variable $op stored our flag.

Flag
texsaw{p0wErSuRgE}
Last updated