Description
Phew, you were able to recover your precious file. Now you investigate the origin of this encryption.
The flag is case insensitive and follows the format FCSC{<pid>:<protocol>:<port>}
, where:
<pid>
is the PID of the process that dropped and performed the encryption and<protocol>
and<port>
are the parameters of the connection with the C&C.
This challenge has been split into four parts:
Files
-
fcsc.7z
591.28 MiB – 754cb093af343356827d650270f9faa56cc4c44f44243ea08590edb1bc270b5e
Author

haxom
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.