Ransomémoire 2/3 - Début d'investigation

forensics memory windows FCSC 2023 solved on

star star

Description

Phew, you were able to recover your precious file. Now you investigate the origin of this encryption.

The flag is case insensitive and follows the format FCSC{<pid>:<protocol>:<port>}, where:

  • <pid> is the PID of the process that dropped and performed the encryption and
  • <protocol> and <port> are the parameters of the connection with the C&C.

This challenge has been split into four parts:

Files

  • fcsc.7z
    591.28 MiB – 754cb093af343356827d650270f9faa56cc4c44f44243ea08590edb1bc270b5e

Author

haxom

Flag

Share my success on Fediverse, Twitter, Linkedin, Facebook, or via email.

Submit your solution

You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.

You need to be logged in to submit a writeup.

Writeups

I've been looking for a long time and I still can't find the flag!

You can vote for the solutions you prefer by using the on their respective pages.

DateAuthor Language Tags Vote
2023-11-06
naacbin
🇬🇧
TeamFrance