forensicseasy

emo

hackthebox

Task: Extract a flag from a malicious Word document used in a ransomware phishing attack. Solution: Extract VBA macros from the .docm file, decode the Base64-encoded PowerShell payload, find an integer array representing XOR-encrypted data, and decrypt with key 0xdf to reveal the flag.

$ ls tags/ techniques/
base64_decodingxor_bruteforcedocm_as_zip_extractionvba_macro_extractionpowershell_deobfuscation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]