Scenario

We have extracted the memory dump from the compromised machine. Find the evidence of the ransomware attack.

https://app.letsdefend.io/challenge/revil-ransomware


Screenshot 2025-08-03 011132.png

Screenshot 2025-08-03 011204.png

first we unzip the challenge file and see we are given 3 files: png / ransom note / memory dump

image.png

This is a screenshot of the system after it was hit by ransomware. We can see that the screen instructs the user to read the file named 993ixjlb-readme.txt. The image is titled "bad day", which might be a clue for the challenge or possibly the name of the ransomware.

Screenshot 2025-08-03 011301.png

From the ransom note, we can gather a lot of useful information. For example, the presence of a Tor address for communication can help us identify the ransomware family. One helpful resource is a website called ID Ransomware, where you can upload the ransom note, a sample of an encrypted file, or payment addresses. It will then try to identify the specific ransomware variant. Knowing the name of the ransomware can assist in further investigation, threat intelligence correlation, and possibly finding available decryption tools or known indicators of compromise. https://id-ransomware.malwarehunterteam.com/index.php

Screenshot 2025-08-03 015341.png

From ID Ransomware, we confirmed it's REvil ransomware as if we didn’t already know that from the challenge name


1- What is the Operating System which the Redline image is being collected on?

Windows 7 Professional 7601 Service Pack 1

Screenshot 2025-08-03 011408.png

To view the user and operating system information, you can find it in the first section labeled "System Information"