Member-only story

MAL: REMnux The Redux TryHackme

Vijay Kumar Gupta
7 min readSep 4, 2024

https://tryhackme.com/room/malremnuxv2

What we learn in this room

  • Identifying and analysing malicious payloads of various formats embedded in PDF’s, EXE’s and Microsoft Office Macros (the most common method that malware developers use to spread malware today)
  • Learning how to identify obfuscated code and packed files — and in turn — analyse these.
  • Analysing the memory dump of a PC that became infected with the Jigsaw ransomware in the real-world using Volatility.

IP Address: 10.10.32.28
Username: remnux
Password: malware

ssh remnux@10.10.32.28

Task 3. Analysing Malicious PDF’s

Question 1. How many types of categories of “Suspicious elements” are there in “notsuspicious.pdf”

Answer: 3

Question 2. Use peepdf to extract the javascript from “notsuspicious.pdf”. What is the flag?

Note the output confirming that there’s Javascript present, but also how it is executed? OpenAction will…

--

--

Vijay Kumar Gupta
Vijay Kumar Gupta

Written by Vijay Kumar Gupta

Vijay Gupta is an inspiring public speaker and social entrepreneur who has dedicated his life to bringing about positive change and empowering communities.

No responses yet