Reversing
★★☆☆☆
Easy
AMOS
Description
Inspired by real-world obfuscation techniques used in the AMOS Stealer malware, this challenge hides a flag using a transformation cipher.
You are provided with a compiled Linux binary that prompts for a decryption key. Analyze the binary to understand the algorithm and find the correct key to reveal the flag.
Binary Information:
Verify integrity after download:
You are provided with a compiled Linux binary that prompts for a decryption key. Analyze the binary to understand the algorithm and find the correct key to reveal the flag.
Binary Information:
Filename: amos
Size: 14,680 bytes (15 KB)
MD5: c3ebc34c4b249eefdf70b7413782e927
SHA1: b32b7ba4595ffe133a6ba8d83d77d0fa6e64badf
SHA256: 1a6e42f4f8df4b1e1b5f2d10b5a4ececc8dbfb844869bccbcb37d58e2523843c
Verify integrity after download:
md5sum amos
sha1sum amos
sha256sum amos
Please log in to submit flags.
Hints
Hint #1
-15 XP
Hint #2
-20 XP
Hint #3
-30 XP
Discussion
No commentsLog in to comment.
No comments yet. Be the first!