Description
Following your analysis, our teams decided to completely reinstall the operating system on the machine to clean it.
However, after the system was reinstalled, the same malware you identified is still present and continues to communicate with the attacker’s C2 server.
We therefore suspect that a deeper persistence mechanism is present on the user’s system, and we believe a Device
has been registered to pre-position itself during system startup.
The flag is in the format FCSC{<device_name>}
where:
<device_name>
is the name of the maliciousDevice
.
For example: FCSC{MyVirtualMouse}
.
This challenge is part of a serie that should be solved sequentially:
Files
-
analyse-memoire.tar.xz
1.05 GiB – 59dbdb3d2e0eb219afc63fa086069b0e21cad79060ca3752b75e910058fce206
Author

Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.
Writeups
There are no public solutions for this challenge yet, but you can submit yours after getting the flag.