Decontamination
Description
Time Corp is currently undergoing recovery from a major breach. In a last ditch effort to maintain access, the hackers dropped malicious files at various points in the network. While most of them were caught, the Incident Response team believes there may still be undiscovered files. Can you find the malicious file in the provided list? Flag Format: retroCTF{FILENAME_HERE}
Find the Trash
We have a SuspiciousFiles.txt file and a DetectedSamplesList.txt which has
Payroll_AF19FD5349.docm
PayrollE8ADFBBA4134.xlsm
Payroll_C32BADE1.xlsm
PayrollBE349BE24.docm
Payroll_ABCDEFABCD.xlsm
Payroll1234567890.docmWe can make the following observations about the malicious file:
Ends with
.docmor.xlsmStarts with
PayrollPayrollcould be followed by an underscore_and 8 - 12 charactersA-F0-9
Can create a regular expression such as ^Payroll_?[A-F0-9]{8,12}.(docm|xlsm)$
^- Beginning of stringPayroll- Starts with "Payroll"_?- Can have 0 or 1 "_"[A-F0-9]{8,12}- Characters from "A" to "F" or "0" to "9" are used 8 to 12 times.(docm|xlsm)- Either ".docm" or ".xlsm"$- End of string
Using it to search, we find there is only one result: Payroll_EA026F52BAF.xlsm

Flag
retroCTF{Payroll_EA026F52BAF.xlsm}
Last updated