Description
One of our administrator has been called after a CryptoLocker has been executed on a highly sensible serveur, right after applying an update provided by a third-party service provider. This malware specifically targets a file that could ruin the company: it is very important to recover it. The administrator tells us that to prevent the malware from spreading, she paused the virtual machine and dumped its memory as soon as she detected the attack. You are our only hope.
Files
-
cryptolocker-v1.tar.xz
121.43 MiB – 81207e9ee7e88f6f7fdbb0978f46fd646df9a2296fd04a5116569af625cb2c31
Author
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.