Payload
CHALLENGE DESCRIPTION
You’ve completed Training Day — congrats, rookie. Now the real game begins. An unmarked binary just landed on your desk. It’s acting shady, tripping a few alarms, but no one’s sure what it really is. Malware? Or just a misunderstood piece of code? Your mission: reverse-engineer the program, trace its behavior, and uncover the truth. Every line of code could be a clue—or a trap. Welcome to your first real case.
SOLUTION
What is the SHA256 hash of func_pointer.exe?
Upload file on VirusTotal
Answer
EDD41B4A819F917F81203424730AAF0C24CC95E40ACFC0F1BD90B11DADF58015What compiler is being used?
Answer
mingWWhat is the compilation date?
Answer
2023-04-06 15:21:17Is ASLR enabled? (True or False)
Answer
FalseWhat is the image base address?
Upload on Binary Ninja Cloud, search for image
Answer
0x140000000What is the entry point?
Search for entry
Answer
0x1125What are the first 8 bytes of the encrypted payload that is being moved to allocated memory? (format: daffd563616c632e)
Answer
unsolvedWhat is the key for decryption in hex?
Answer
unsolvedWhat is the address of the decrypted payload?
Answer
unsolvedWhat are the first 8 bytes of the decrypted payload that is being moved to allocated memory? (format: daffd563616c632e)
Answer
unsolvedThere are several functions that are not in the import table but are invoked. Which of these functions starts with V?