Decontamination
Description
Time Corp is currently undergoing recovery from a major breach. In a last ditch effort to maintain access, the hackers dropped malicious files at various points in the network. While most of them were caught, the Incident Response team believes there may still be undiscovered files. Can you find the malicious file in the provided list? Flag Format: retroCTF{FILENAME_HERE}
Find the Trash
We have a SuspiciousFiles.txt
file and a DetectedSamplesList.txt
which has
We can make the following observations about the malicious file:
Ends with
.docm
or.xlsm
Starts with
Payroll
Payroll
could be followed by an underscore_
and 8 - 12 charactersA-F0-9
Can create a regular expression such as ^Payroll_?[A-F0-9]{8,12}.(docm|xlsm)$
^
- Beginning of stringPayroll
- Starts with "Payroll"_?
- Can have 0 or 1 "_"[A-F0-9]{8,12}
- Characters from "A" to "F" or "0" to "9" are used 8 to 12 times.(docm|xlsm)
- Either ".docm" or ".xlsm"$
- End of string
Using it to search, we find there is only one result: Payroll_EA026F52BAF.xlsm
Flag
retroCTF{Payroll_EA026F52BAF.xlsm}
Last updated