TrueSecrest - HackTheBox

2025. 11. 13. 03:15·

Đề bài


Giải

Bài này cho mình một memory files, vậy đầu tiên mình sẽ xem danh sách tiến trình trước

Volatility 3 Framework 2.26.2
PID PPID ImageFileName Offset(V) Threads Handles SessionId Wow64 CreateTime ExitTime File output
4 0 System 0x8378ed28 87 475 N/A False 2022-12-15 06:08:19.000000 UTC N/A Disabled
252 4 smss.exe 0x83e7e020 2 29 N/A False 2022-12-15 06:08:19.000000 UTC N/A Disabled
320 312 csrss.exe 0x843cf980 9 375 0 False 2022-12-15 06:08:19.000000 UTC N/A Disabled
356 312 wininit.exe 0x837f6280 3 79 0 False 2022-12-15 06:08:19.000000 UTC N/A Disabled
368 348 csrss.exe 0x84402d28 7 203 1 False 2022-12-15 06:08:19.000000 UTC N/A Disabled
396 348 winlogon.exe 0x84409030 3 110 1 False 2022-12-15 06:08:19.000000 UTC N/A Disabled
452 356 services.exe 0x844577a0 9 213 0 False 2022-12-15 06:08:19.000000 UTC N/A Disabled
468 356 lsass.exe 0x8445e030 7 591 0 False 2022-12-15 06:08:19.000000 UTC N/A Disabled
476 356 lsm.exe 0x8445f030 10 142 0 False 2022-12-15 06:08:19.000000 UTC N/A Disabled
584 452 svchost.exe 0x84488030 10 347 0 False 2022-12-15 06:08:19.000000 UTC N/A Disabled
644 452 VBoxService.ex 0x844a2030 11 116 0 False 2022-12-15 06:08:19.000000 UTC N/A Disabled
696 452 svchost.exe 0x844ab478 7 243 0 False 2022-12-14 21:08:21.000000 UTC N/A Disabled
752 452 svchost.exe 0x844c3030 18 457 0 False 2022-12-14 21:08:21.000000 UTC N/A Disabled
864 452 svchost.exe 0x845f5030 16 399 0 False 2022-12-14 21:08:21.000000 UTC N/A Disabled
904 452 svchost.exe 0x845fcd28 15 311 0 False 2022-12-14 21:08:21.000000 UTC N/A Disabled
928 452 svchost.exe 0x84484d28 23 956 0 False 2022-12-14 21:08:21.000000 UTC N/A Disabled
992 452 svchost.exe 0x8e013488 5 114 0 False 2022-12-14 21:08:21.000000 UTC N/A Disabled
1116 452 svchost.exe 0x8e030a38 18 398 0 False 2022-12-14 21:08:21.000000 UTC N/A Disabled
1228 452 spoolsv.exe 0x8e0525b0 13 275 0 False 2022-12-14 21:08:21.000000 UTC N/A Disabled
1268 452 svchost.exe 0x84477d28 19 337 0 False 2022-12-14 21:08:21.000000 UTC N/A Disabled
1352 452 taskhost.exe 0x8e0a2658 9 223 1 False 2022-12-14 21:08:22.000000 UTC N/A Disabled
1448 864 dwm.exe 0x844d2d28 3 69 1 False 2022-12-14 21:08:22.000000 UTC N/A Disabled
1464 1436 explorer.exe 0x8e0d3a40 32 1069 1 False 2022-12-14 21:08:22.000000 UTC N/A Disabled
1636 452 svchost.exe 0x8e1023a0 10 183 0 False 2022-12-14 21:08:22.000000 UTC N/A Disabled
1680 452 svchost.exe 0x8e10d998 14 224 0 False 2022-12-14 21:08:22.000000 UTC N/A Disabled
1776 452 wlms.exe 0x8e07d900 4 45 0 False 2022-12-14 21:08:22.000000 UTC N/A Disabled
1832 1464 VBoxTray.exe 0x83825540 12 140 1 False 2022-12-14 21:08:22.000000 UTC N/A Disabled
352 452 sppsvc.exe 0x8e1cd8d0 4 144 0 False 2022-12-14 21:08:23.000000 UTC N/A Disabled
1632 452 svchost.exe 0x8e1f6a40 5 91 0 False 2022-12-14 21:08:23.000000 UTC N/A Disabled
856 452 SearchIndexer. 0x8e06f2d0 13 626 0 False 2022-12-14 21:08:28.000000 UTC N/A Disabled
2128 1464 TrueCrypt.exe 0x91892030 4 262 1 False 2022-12-14 21:08:31.000000 UTC N/A Disabled
2760 452 svchost.exe 0x91865790 13 362 0 False 2022-12-14 21:10:23.000000 UTC N/A Disabled
2332 584 WmiPrvSE.exe 0x83911848 5 112 0 False 2022-12-14 21:12:23.000000 UTC N/A Disabled
2580 452 taskhost.exe 0x8e1ef208 5 86 1 False 2022-12-14 21:13:01.000000 UTC N/A Disabled
2176 1464 7zFM.exe 0x8382f198 3 135 1 False 2022-12-14 21:22:44.000000 UTC N/A Disabled
3212 1464 DumpIt.exe 0x83c1d030 2 38 1 False 2022-12-14 21:33:28.000000 UTC N/A Disabled
272 368 conhost.exe 0x83c0a030 2 34 1 False 2022-12-14 21:33:28.000000 UTC N/A Disabled
Time Stamp: Wed Nov 12 22:44:47 2025

Mình thấy có một tiến trình TrueCrypt.exe, đây là một ứng dụng khá lạ vì nó dùng đã mã hóa, nên rất có thể người này đã chạy tiến trình này để mã hóa một file hoặc thứ gì đó

Sau đó mình sử dụng netscan và cmdline

netscan

Volatility 3 Framework 2.26.2
Offset Proto LocalAddr LocalPort ForeignAddr ForeignPort State PID Owner Created
0xa08970 UDPv6 fe80::c462:3ba5:e8ed:5629 1900 * 0 1680 svchost.exe 2022-12-14 21:10:23.000000 UTC
0x1c700e0 TCPv4 0.0.0.0 49156 0.0.0.0 0 LISTENING 468 lsass.exe N/A
0x28b10b0 UDPv6 ::1 1900 * 0 1680 svchost.exe 2022-12-14 21:10:23.000000 UTC
0x2b50570 UDPv4 0.0.0.0 3702 * 0 1680 svchost.exe 2022-12-14 21:08:28.000000 UTC
0x548da68 UDPv4 0.0.0.0 5355 * 0 1116 svchost.exe 2022-12-14 21:33:22.000000 UTC
0x548da68 UDPv6 :: 5355 * 0 1116 svchost.exe 2022-12-14 21:33:22.000000 UTC
0x57ad758 UDPv4 0.0.0.0 58111 * 0 1680 svchost.exe 2022-12-14 21:08:22.000000 UTC
0x57ad758 UDPv6 :: 58111 * 0 1680 svchost.exe 2022-12-14 21:08:22.000000 UTC
0x57add80 UDPv4 0.0.0.0 58110 * 0 1680 svchost.exe 2022-12-14 21:08:22.000000 UTC
0x5c70330 UDPv4 0.0.0.0 3702 * 0 1680 svchost.exe 2022-12-14 21:08:28.000000 UTC
0x5c70330 UDPv6 :: 3702 * 0 1680 svchost.exe 2022-12-14 21:08:28.000000 UTC
0x6b21380 TCPv4 0.0.0.0 5357 0.0.0.0 0 LISTENING 4 System N/A
0x6b21380 TCPv6 :: 5357 :: 0 LISTENING 4 System N/A
0x6d0e358 UDPv4 0.0.0.0 0 * 0 1632 svchost.exe 2022-12-14 21:08:23.000000 UTC
0x6d0e358 UDPv6 :: 0 * 0 1632 svchost.exe 2022-12-14 21:08:23.000000 UTC
0x6d0e510 UDPv4 0.0.0.0 0 * 0 1632 svchost.exe 2022-12-14 21:08:23.000000 UTC
0x82940a8 TCPv4 0.0.0.0 49154 0.0.0.0 0 LISTENING 928 svchost.exe N/A
0x8710b38 UDPv4 0.0.0.0 3702 * 0 1680 svchost.exe 2022-12-14 21:08:28.000000 UTC
0x8b5c008 TCPv4 0.0.0.0 49154 0.0.0.0 0 LISTENING 928 svchost.exe N/A
0x8b5c008 TCPv6 :: 49154 :: 0 LISTENING 928 svchost.exe N/A
0x8b99d58 UDPv4 127.0.0.1 55598 * 0 1680 svchost.exe 2022-12-14 21:10:23.000000 UTC
0x9965bc8 UDPv4 0.0.0.0 3702 * 0 1680 svchost.exe 2022-12-14 21:08:28.000000 UTC
0x9965bc8 UDPv6 :: 3702 * 0 1680 svchost.exe 2022-12-14 21:08:28.000000 UTC
0x9ae7398 TCPv4 0.0.0.0 49155 0.0.0.0 0 LISTENING 452 services.exe N/A
0x9ae7398 TCPv6 :: 49155 :: 0 LISTENING 452 services.exe N/A
0x9ae77e8 TCPv4 0.0.0.0 49155 0.0.0.0 0 LISTENING 452 services.exe N/A
0xb264c20 UDPv4 127.0.0.1 1900 * 0 1680 svchost.exe 2022-12-14 21:10:23.000000 UTC
0xb83c2c8 UDPv6 ::1 55597 * 0 1680 svchost.exe 2022-12-14 21:10:23.000000 UTC
0xb840f50 UDPv4 10.10.10.13 1900 * 0 1680 svchost.exe 2022-12-14 21:10:23.000000 UTC
0xb871f50 UDPv4 0.0.0.0 0 * 0 1116 svchost.exe 2022-12-14 21:08:24.000000 UTC
0xb871f50 UDPv6 :: 0 * 0 1116 svchost.exe 2022-12-14 21:08:24.000000 UTC
0xb8b31e8 TCPv4 0.0.0.0 135 0.0.0.0 0 LISTENING 696 svchost.exe N/A
0xb8b31e8 TCPv6 :: 135 :: 0 LISTENING 696 svchost.exe N/A
0xb8b3898 TCPv4 0.0.0.0 135 0.0.0.0 0 LISTENING 696 svchost.exe N/A
0xb8ba1c0 TCPv4 0.0.0.0 49152 0.0.0.0 0 LISTENING 356 wininit.exe N/A
0xb8ba1c0 TCPv6 :: 49152 :: 0 LISTENING 356 wininit.exe N/A
0xb8ba488 TCPv4 0.0.0.0 49152 0.0.0.0 0 LISTENING 356 wininit.exe N/A
0xb8eb188 TCPv4 0.0.0.0 49156 0.0.0.0 0 LISTENING 468 lsass.exe N/A
0xb8eb188 TCPv6 :: 49156 :: 0 LISTENING 468 lsass.exe N/A
0xb8f3698 TCPv4 0.0.0.0 49153 0.0.0.0 0 LISTENING 752 svchost.exe N/A
0xb8f3698 TCPv6 :: 49153 :: 0 LISTENING 752 svchost.exe N/A
0xb8f3c08 TCPv4 0.0.0.0 49153 0.0.0.0 0 LISTENING 752 svchost.exe N/A
0xbeaa260 UDPv4 0.0.0.0 5355 * 0 1116 svchost.exe 2022-12-14 21:33:22.000000 UTC
0xc072008 UDPv4 0.0.0.0 0 * 0 2292 iexplore.exe 2022-12-14 21:24:22.000000 UTC
0xc072008 UDPv6 :: 0 * 0 2292 iexplore.exe 2022-12-14 21:24:22.000000 UTC
0xc424468 UDPv4 10.10.10.13 137 * 0 4 System 2022-12-14 21:08:22.000000 UTC
0xc4279c8 TCPv4 0.0.0.0 445 0.0.0.0 0 LISTENING 4 System N/A
0xc4279c8 TCPv6 :: 445 :: 0 LISTENING 4 System N/A
0xc42a790 UDPv4 10.10.10.13 138 * 0 4 System 2022-12-14 21:08:22.000000 UTC
0xc4ad3c8 UDPv4 0.0.0.0 5355 * 0 1116 svchost.exe 2022-12-14 21:23:22.000000 UTC
0xc54e438 UDPv4 0.0.0.0 57751 * 0 1116 svchost.exe 2022-12-14 21:28:22.000000 UTC
0xc54e438 UDPv6 :: 57751 * 0 1116 svchost.exe 2022-12-14 21:28:22.000000 UTC
0xc551c20 UDPv4 0.0.0.0 0 * 0 644 VBoxService.ex 2022-12-14 21:24:18.000000 UTC
0xc5a1de8 TCPv4 127.0.0.1 49171 239.255.255.250 8000 CLOSED - - -
0xc68c580 TCPv4 10.10.10.13 139 0.0.0.0 0 LISTENING 4 System N/A
Time Stamp: Wed Nov 12 23:18:33 2025

Các cổng LISTENING (máy đang mở server) là dấu hiệu quan trọng

PID Process Cổng Ghi chú
4 System 445, 139, 5357 dịch vụ SMB và HTTP Windows (bình thường)
356 wininit.exe 49152 bình thường
452 services.exe 49155 rất đáng nghi, vì services.exe thường không trực tiếp nghe TCP
468 lsass.exe 49156 bình thường (RPC / LSASS)
696 svchost.exe 135 RPC Endpoint Mapper (bình thường)
752 svchost.exe 49153 dịch vụ Windows (bình thường)
928 svchost.exe 49154 dịch vụ Windows (bình thường)

👉 PID 452 (services.exe) mở cổng 49155 cả IPv4/IPv6 → có khả năng host C2 server tùy chỉnh

cmdline

Volatility 3 Framework 2.26.2
PID Process Args
4 System -
252 smss.exe \SystemRoot\System32\smss.exe
320 csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
356 wininit.exe -
368 csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
396 winlogon.exe -
452 services.exe C:\Windows\system32\services.exe
468 lsass.exe C:\Windows\system32\lsass.exe
476 lsm.exe C:\Windows\system32\lsm.exe
584 svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch
644 VBoxService.ex C:\Windows\System32\VBoxService.exe
696 svchost.exe C:\Windows\system32\svchost.exe -k RPCSS
752 svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
864 svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
904 svchost.exe C:\Windows\system32\svchost.exe -k LocalService
928 svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
992 svchost.exe -
1116 svchost.exe C:\Windows\system32\svchost.exe -k NetworkService
1228 spoolsv.exe C:\Windows\System32\spoolsv.exe
1268 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
1352 taskhost.exe "taskhost.exe"
1448 dwm.exe -
1464 explorer.exe C:\Windows\Explorer.EXE
1636 svchost.exe C:\Windows\System32\svchost.exe -k utcsvc
1680 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
1776 wlms.exe -
1832 VBoxTray.exe "C:\Windows\System32\VBoxTray.exe" 
352 sppsvc.exe -
1632 svchost.exe -
856 SearchIndexer. C:\Windows\system32\SearchIndexer.exe /Embedding
2128 TrueCrypt.exe "C:\Program Files\TrueCrypt\TrueCrypt.exe" 
2760 svchost.exe C:\Windows\System32\svchost.exe -k secsvcs
2332 WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe
2580 taskhost.exe -
2176 7zFM.exe "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\IEUser\Documents\backup_development.zip"
3212 DumpIt.exe "C:\Users\IEUser\Downloads\DumpIt.exe" 
272 conhost.exe \??\C:\Windows\system32\conhost.exe "-180402527637560752-8319479621992226886-774806053592412399-20651748-1013740728
Time Stamp: Wed Nov 12 23:19:50 2025
  • services.exe chạy như bình thường, nhưng PID 2760 – svchost.exe -k secsvcs cũng rất khả nghi: group secsvcs (Security Services) không tồn tại trong Windows mặc định
  • 7zFM.exe (PID 2176) được mở cùng với file backup_development.zip → có thể chứa mã nguồn hoặc script bị nén
  • TrueCrypt.exe (PID 2128) chạy → có thể đang mount volume mã hóa chứa code
    => ta có 3 mục tiêu cần trích xuất:
    1. services.exe (PID 452)
    2. svchost.exe -k secsvcs (PID 2760)
    3. 7zFM.exe (PID 2176) và file backup_development.zip

truecrypt

Cuối cùng, mình sẽ thử nốt plugin truecrypt để quét xem có ghi lại được passwd nào không, nếu có thì  có thể dùng để mở volume TrueCrypt thật chứa source

Volatility 3 Framework 2.26.2
Progress:  100.00               PDB scanning finished
Offset  Length  Password

0x89ebf064      28      X2Hk2XbEJqWYsh8VdbSYg6WpG9g7

filescan

Sau khi xác định được mật khẩu, mình sẽ kiếm ra địa chỉ file-object (trường Offset(V) hay FileObject) của:

  • Container TrueCrypt (.tc/.hc)
  • Volume/ổ đã mount (\Device\TrueCryptVolumeX, \Device\HarddiskVolume…)
  • C:\Users\IEUser\Documents\backup_development.zip (đã thấy trong cmdline của 7zFM.exe PID 2176)
0x90fc688  100.0\Program Files\TrueCrypt\TrueCrypt.exe
0xbbf6158       \Users\IEUser\Documents\backup_development.zip
0xc1f8590       \Program Files\TrueCrypt\TrueCrypt.exe
0xc50c550       \Users\IEUser\Documents\development.tc

Vậy là đã scan ra được một file .tc

handle

Tiếp theo thì trước khi dumpfile mình sẽ lấy đúng _FILE_OBJECT từ handles của tiến trình đang mở file (độ chính xác cao)

138:2176        7zFM.exe        0x843f6158      0x238   File    0x120089        \Device\HarddiskVolume1\Users\IEUser\Documents\backup_development.zip

dumpfiles

Cuối cùng là mình sẽ dumpfile ra

Volatility 3 Framework 2.26.2
Progress:  100.00               PDB scanning finished
Cache   FileObject      FileName        Result

DataSectionObject       0x843f6158      backup_development.zip  file.0x843f6158.0x839339d0.DataSectionObject.backup_development.zip.dat
SharedCacheMap  0x843f6158      backup_development.zip  file.0x843f6158.0x9185db40.SharedCacheMap.backup_development.zip.vacb

zip

Sau đó mình sẽ thu được file zip và sẽ unzip nó ra

Archive:  dumpfiles_out/file.0x843f6158.0x839339d0.DataSectionObject.backup_development.zip.dat
 extracting: development.tc

Nhận được file development.tc như đã phân tích được ở trên

TrueCrypt

Sử dụng TrueCrypt để mount ra máy

Mount ra ổ E

 

Thư mục gồm những file sau

.
├── AgentServer.cs
└── sessions
    ├── 5818acbe-68f1-4176-a2f2-8c6bcb99f9fa.log.enc
    ├── c65939ad-5d17-43d5-9c3a-29c6a7c31a32.log.enc
    └── de008160-66e4-4d51-8264-21cbc27661fc.log.enc

2 directories, 4 files

Mình nhận được một file AgentServer.cs và 3 file log như sau

AgentServer.cs

using System;
using System.IO;
using System.Net;
using System.Net.Sockets;
using System.Text;
using System.Security.Cryptography;

class AgentServer {
  
    static void Main(String[] args)
    {
        var localPort = 40001;
        IPAddress localAddress = IPAddress.Any;
        TcpListener listener = new TcpListener(localAddress, localPort);
        listener.Start();
        Console.WriteLine("Waiting for remote connection from remote agents (infected machines)...");
    
        TcpClient client = listener.AcceptTcpClient();
        Console.WriteLine("Received remote connection");
        NetworkStream cStream = client.GetStream();
    
        string sessionID = Guid.NewGuid().ToString();
    
        while (true)
        {
            string cmd = Console.ReadLine();
            byte[] cmdBytes = Encoding.UTF8.GetBytes(cmd);
            cStream.Write(cmdBytes, 0, cmdBytes.Length);
            
            byte[] buffer = new byte[client.ReceiveBufferSize];
            int bytesRead = cStream.Read(buffer, 0, client.ReceiveBufferSize);
            string cmdOut = Encoding.ASCII.GetString(buffer, 0, bytesRead);
            
            string sessionFile = sessionID + ".log.enc";
            File.AppendAllText(@"sessions\" + sessionFile, 
                Encrypt(
                    "Cmd: " + cmd + Environment.NewLine + cmdOut
                ) + Environment.NewLine
            );
        }
    }
    
    private static string Encrypt(string pt)
    {
        string key = "AKaPdSgV";
        string iv = "QeThWmYq";
        byte[] keyBytes = Encoding.UTF8.GetBytes(key);
        byte[] ivBytes = Encoding.UTF8.GetBytes(iv);
        byte[] inputBytes = System.Text.Encoding.UTF8.GetBytes(pt);
        
        using (DESCryptoServiceProvider dsp = new DESCryptoServiceProvider())
        {
            var mstr = new MemoryStream();
            var crystr = new CryptoStream(mstr, dsp.CreateEncryptor(keyBytes, ivBytes), CryptoStreamMode.Write);
            crystr.Write(inputBytes, 0, inputBytes.Length);
            crystr.FlushFinalBlock();
            return Convert.ToBase64String(mstr.ToArray());
        }
    }
}

5818acbe-68f1-4176-a2f2-8c6bcb99f9fa.log.enc

wENDQtzYcL3CKv0lnnJ4hk0JYvJVBMwTj7a4Plq8h68=
M35jHmvkY9WGlWdXo0ByOJrYhHmtC8O0rZ28CviPexkfHCFTfKUQVw==
hufGZi+isAzspq9AOs+sIwqijQL53yIJa5EVcXF3QLLwXPS1AejOWfPzJZ/wHQbBAIOxsJJIcFq0+83hkFcz+Jz9HAGl8oDianTHILnUlzl1oEc30scurf41lEg+KSu/6orcZQl3Bws=
6ySb2CBt+Z1SZ4GlB7/yL4cOS/j1whoSEqkyri0dj0juRpFBc4kqLw==
U2ltlIYcyGYnuh0P+ahTMe3t9e+TYxKwU+PGm/UsltpkanmBmWym5mDDqqQ14J/VSSgCRKXn/E+DKaxmNc9PpPOG1vZndmflMUnuTUzbiIdHBUAEOWMO8wVCufhanIdN56BhtczjrJS5HRvl9NwE/FNkLGZt6HQNSgDRzrpY0mseJHjTbkal6nh226f43X3ZihIF4sdLn7l766ZksE9JDASBi7qEotE7f0yxEbStNOZ1QPDchKVFkw==

c65939ad-5d17-43d5-9c3a-29c6a7c31a32.log.enc

wENDQtzYcL3CKv0lnnJ4hk0JYvJVBMwTj7a4Plq8h68=
M35jHmvkY9WGlWdXo0ByOJrYhHmtC8O0eu8xtbA16kKagSu6MIFSWQ==
hufGZi+isAzspq9AOs+sI0VYrJ6o8j3e9a1tNb9m1bVwJZpRxCOxg3Vs0NdU9xNxPku+sBziVYsVaOtgWkbH9691++BUkD1BNVRMc0e69lVs2cJmQIAbnagMaJ6OQEZAAvZ/G6y57CQ=
6ySb2CBt+Z1SZ4GlB7/yL8asWs1F/wTUTOLEHO92yuzuTzdsiM5t5w==
U2ltlIYcyGYnuh0P+ahTMe3t9e+TYxKwU+PGm/UsltpkanmBmWym5mDDqqQ14J/VSSgCRKXn/E+DKaxmNc9PpPOG1vZndmflMUnuTUzbiIdHBUAEOWMO8wVCufhanIdN56BhtczjrJS5HRvl9NwE/FNkLGZt6HQNSgDRzrpY0mseJHjTbkal6nh226f43X3ZihIF4sdLn7l766ZksE9JDASBi7qEotE7f0yxEbStNOZ1QPDchKVFkw==

de008160-66e4-4d51-8264-21cbc27661fc.log.enc

wENDQtzYcL3CKv0lnnJ4hk0JYvJVBMwTj7a4Plq8h68=
M35jHmvkY9WGlWdXo0ByOJrYhHmtC8O0hn+gLHaClb4QbACeOoSiYA==
hufGZi+isAzspq9AOs+sI/u+AS/aWPrAYd+mctDo7qEt+SpW2sELvSaxx6RRdK3vDavTsziAtb4/iCZ72v3QGh78yhY2KXZFu8qAcYdN7ltOOlg1LSrdkhjgr+CWTlvWh7A8IS7NwwI=
6ySb2CBt+Z1SZ4GlB7/yL4rJGeZ0WVaYW7N15aUsDAqzIYJWL/f0yw==
U2ltlIYcyGaSmL5xmAkEop+/f5MGUEWeWjpCTe5eStd/cg9FKp89l/EksGB90Z/hLbT44/Ur/6XL9aI27v0+SzaMFsgAeamjyYTRfLQk2fQlsRPCY/vMDj0FWRCGIZyHXCVoo4AePQB93SgQtOEkTQ2oBOeVU4X5sNQo23OcM1wrFrg8x90UOk2EzOm/IbS5BR+Wms1M2dCvLytaGCTmsUmBsATEF/zkfM2aGLytnu5+72bD99j7AiSvFDCpd1aFsogNiYYSai52YKIttjvao22+uqWMM/7Dx/meQWRCCkKm6s9ag1BFUQ==
+iTzBxkIgVWgWm/oyP/Uf6+qW+A+kMTQkouTEammirkz2efek8yfrP5l+mtFS+bWA7TCjJDK2nLAdTKssL7CrHnVW8fMvc6mJR4Ismbs/d/fMDXQeiGXCA==

Trong volume có AgentServer.cs (C#). Tóm tắt chức năng:

  • Lắng nghe TCP trên port 40001 (TcpListener(IPAddress.Any, 40001))
  • Nhận 1 kết nối từ agent, sau đó vòng lặp:
    • đọc lệnh từ console, gửi qua NetworkStream
    • nhận stdout từ agent
    • ghi log vào sessions\<GUID>.log.enc, mã hoá DES/CBC với key AKaPdSgV, IV QeThWmYq, và Base64 mỗi dòng

OpenSSL

Chương trình sử dụng mã hóa DES/CBC cơ bản cùng key và IV nên mình đã chuẩn bị một dòng decode đơn giản sau

echo "<BASE64_LINE>" | base64 -d | openssl enc -d -des-cbc -K 414b615064536756 -iv 51655468576d5971

Flag

Flag: HTB{570r1ng_53cr37_1n_m3m0ry_15_n07_g00d}

'WriteUp > Forensics' 카테고리의 다른 글

emo - HackTheBox  (0) 2025.11.21
oBfsC4t10n - HackTheBox  (0) 2025.11.21
zip2john2zip - BuckeyeCTF 2025  (0) 2025.11.09
The Professor's Files - BuckeyeCTF 2025  (0) 2025.11.09
1985 - BuckeyeCTF 2025  (0) 2025.11.09
'WriteUp/Forensics' Other posts in category
  • emo - HackTheBox
  • oBfsC4t10n - HackTheBox
  • zip2john2zip - BuckeyeCTF 2025
  • The Professor's Files - BuckeyeCTF 2025
longhd
longhd
Longhd's Blog
  • longhd
    Ha Duy Long - InfosecPTIT
    longhd
  • Total
    Today
    Yesterday
  • About me

    • Hello I'm Duy Long 👋🏻
    • View all categories (117) N
      • Certificates (4)
      • CTF (3)
      • WriteUp (94) N
        • Forensics (44) N
        • Steganography (5)
        • RE (9) N
        • OSINT (8)
        • Web (17)
        • MISC (6)
        • Crypto (3)
        • Pwn (2)
      • Love Story (0)
      • Labs (15)
        • Information Gathering (10)
        • Vulnerability Scanning (2)
        • Introduction to Web Applica.. (1)
        • Common Web Application Atta.. (1)
        • SQL Injection Attacks (1)
  • Blog Menu

    • Home
    • Tag
    • GuestBook
  • Popular Posts

  • Tags

    THM
    Web
    Dreamhack
    htb
    Re
    SunshineCTF2025
    POCCTF2025
    PTITCTF2025
    OSINT
    writeup
    BuckeyeCTF2025
    CHH
    EnigmaXplore3.0
    V1tCTF2025
    CTF
    picoCTF
    CSCV2025
    misc
    Forensics
    Steganography
  • Recent Comments

  • Recent Posts

  • hELLO· Designed ByLong.v4.10.4
longhd
TrueSecrest - HackTheBox
Go to Top

티스토리툴바