#BlueTeam challenge today, we will investigate capture.pcap file

First what we will be trying to find something weird in communication capture, let’s start WireShark and look inside >>

We can found some HTTP requuest inside >>

Packet nr 30 is really important there is GET request for download client base64, maybe some binary, using wget command >

So we can try to save this client_base64 file >>

First we will use base64 -d command for decode file and identify >

We will try to decompile using Ghidra, but nothing really useful, but there are some messages inside look like python script compiled to binary >>

So we can try to use PyInstaller Extractor >>

https://github.com/extremecoders-re/pyinstxtractor

No we can find client_extracted folder and inside is client.pyc file, this file we can try to decompile using
uncompyle6 >>

Note: Use older version of python, I used python 3.9 and works fine >>

And now we can found whole client.py script >>

And there we can found some really interesting things >>

  • We know that our focus will be on IP 10.0.2.64 and port 1337 TCP communication
  • We have crypted algoritm, we can make decrypt
  • We know XOR key

So we can grab all data what we need from capture.pcap file >>

And now we can make simple script for decompile this data >>

And now we can read communication and answer all question >>

And we are DONE!

C2 communication was PWNed !!

Happy hacking!!

Leave a Reply

Your email address will not be published. Required fields are marked *