Forum Discussion
LN1
Bronze II
10 months agoReverse Engineering
RE: Immersive Care: Ep.5 – Reverse Engineering Feel like I'm missing something obvious here. I have decompiled the ransomware and can see the xorIT command, but not sure how to find the secret ke...
- 10 months ago
Read the python-exe-extractor tool output carefully as it will give you a hint on further steps you need to undertake to decompile
KieranRowley
Community Manager
10 months agoHi LN1
Welcome to The Human Connection!
Please can you provide some more details of the steps you have already taken so that your fellow community members are able to assist you
LN1
Bronze II
10 months agodecompiled the ransomware and found the commands used to generate the ransom note and to encrypt .txt files. Tried looking into initialisation of variables but couldn't find anything. Noticed a secret_key string within the decompiled file, but unsure where this is located.