eepy (Huntress CTF 2024)

By: yukna on
CTFComSecCyberSecurityWrite-upHuntressHuntress-CTF-2024

Author: @HuskyHacks

yawn why am i so eeeeeeeeepy?

I was the 14th solve. Pretty cool. Windows executable, I immediately popped it into Binja. I entered the main function, and scoured for the main action. A lot of threads and sleeping, and a lot of red herrings to waste time. There was, however, one memcopy that looked Suspicious:

Suspicious memcopy

It was the only one that was copying data over, and I went to look at it. It was 0x26 bytes before 0s. I copy the hexadecimal data over to cyberchef and convert from hexadecimal. It was gibberish. However, it is 38 characters, so it had to be the flag. I had an inkling that HuskyHacks might use XOR, so I just threw a XOR Brute Force with flag and the crib, and we got the flag! (Key was 0xAA)