MalWhere?
Last updated
Last updated
Given us a .exe file that is not a malwere, but Antivirus detects it as a malwere because this file using some functions that are commonly seen in a malware, says the author.
If that being said, we start our static analysis with reading the file's strings.
We can see a powershell script being executed upon running the executable.
We notice that are a something hiding inside the base64 encoding, so we develop a .py script to decode it and it looks like this.
So we had a readable function that calculates an ASCII values and append it together.
Again, develop a script to calculate the ASCII value for variable $op and $ra.
So we got the strings that we wanted, turns out that variable $op stored our flag.
texsaw{p0wErSuRgE}
- for helping me and solving this challenge. Kudos!