Notsus.Exe

Crash out

So for this challenge we are given a password protected zip file with 2 files inside, flag.txt.yorm and notsus.exe

First thing I tried was using John The Ripper to crack the password, of which after about 30 minutes, it seemed like I had cracked something (i wish, turns out this was absolutely USELESS)

But when extract this, i got an error

So after much thinking and much dying inside, we got a hint of using bkcrack.

By running ./bkcrack -L ../files.zip I could find out if it is using ZipCrypto, making it vulnerable to a Known Plaintext Attack

So since we know that there is an exe file we can guess its file header and what the first 12 bytes would be, by running ./bkcrack -C ../files.zip -c notsus.exe -p outputwindows.txt and letting it run

Where i get the keys d1608c35 d11d350a 4bc3da9c , and thus by running ./bkcrack -C ../files.zip -k d1608c35 d11d350a 4bc3da9c -D files_no_password.zip I would be able to get the full contents.

Now that we have a functioning Notsus.exe file, how do we work with it? After performing some strings and looking around, we got to know it was a Python exe. So, my teammate, Rian managed to turn it into a pyc file which after decompiling into python, we found the following

Turns out, its RC4, which can be reversed to create a solve script

Which gives us the final flag

grey{this_program_cannot_be_run_in_dos_mode_hehe}

Last updated