UMass CTF 2026 - Click Here For Free Bricks
Hey! A man was caught with malware on his PC in Lego City. Luckily, we were able to get a packet capture of his device during the download. Help Lego City Police figure out the source of this malicious download.
The flag for this challenge is in the format UMASS{[sha256sum]} of the malicious download.
Initial Analysis
The challenge provides a packet capture
(thedamage.pcapng) containing traffic from a machine that
downloaded malware. The goal is to identify the malicious file and its
hash.
Solution
Using tshark, we analyzed the HTTP traffic to see what
files were downloaded:
1 | tshark -r thedamage.pcapng -Y http -T fields -e http.host -e http.request.uri | sort | uniq -c | sort -rn |
The output revealed several interesting files: -
/installer.py - /launcher - Several images
(/fungame.jpg, /cooldog.jpeg, etc.)
We extracted the objects from the HTTP sessions:
1 | tshark -r thedamage.pcapng --export-objects http,extracted_files -q |
The launcher file appeared suspicious, but its file type
was obscured and it didn’t match known malware signatures.
Examining installer.py revealed it was a dropper script
that decrypts launcher:
1 | import hashlib |
The script uses PyNaCl (SecretBox) to decrypt
launcher using the SHA256 hash of the seed
38093248092rsjrwedoaw3.
Decryption and Hashing
After decrypting the file, we calculated its SHA256 hash. The
decrypted file was identified as a
FreeBSD/i386 compact demand paged dynamically linked executable.
- Decrypted SHA256:
e7a09064fc40dd4e5dd2e14aa8dad89b328ef1b1fdb3288e4ef04b0bd497ccae
Checking this hash on VirusTotal confirms it is a known malicious file.