catted 650c844110baced87e1606453b93f22a.txt to get the first flag
did systemctl list-units --type=service --state=running to list running services
UNIT LOAD ACTIVE SUB DESCRIPTION accounts-daemon.service loaded active running Accounts Service acpid.service loaded active running ACPI event daemon atd.service loaded active running Deferred execution scheduler avahi-daemon.service loaded active running Avahi mDNS/DNS-SD Stack cron.service loaded active running Regular background program ⦠cups-browsed.service loaded active running Make remote CUPS printers a⦠cups.service loaded active running CUPS Scheduler dbus.service loaded active running D-Bus System Message Bus getty@tty1.service loaded active running Getty on tty1 httpd.service loaded active running LSB: starts Apache Web Serv⦠irqbalance.service loaded active running irqbalance daemon kerneloops.service loaded active running Tool to automatically colle⦠lightdm.service loaded active running Light Display Manager ModemManager.service loaded active running Modem Manager multipathd.service loaded active running Device-Mapper Multipath Dev⦠mysqld.service loaded active running LSB: start and stop MySQL networkd-dispatcher.service loaded active running Dispatcher daemon for syste⦠NetworkManager.service loaded active running Network Manager polkit.service loaded active running Authorization Manager rsyslog.service loaded active running System Logging Service rtkit-daemon.service loaded active running RealtimeKit Scheduling Poli⦠serial-getty@ttyS0.service loaded active running Serial Getty on ttyS0 snap.amazon-ssm-agent.amaz⦠loaded active running Service for snap applicatio⦠snapd.service loaded active running Snap Daemon ssh.service loaded active running OpenBSD Secure Shell server switcheroo-control.service loaded active running Switcheroo Control Proxy se⦠systemd-journald.service loaded active running Journal Service systemd-logind.service loaded active running Login Service systemd-networkd.service loaded active running Network Service systemd-resolved.service loaded active running Network Name Resolution systemd-timesyncd.service loaded active running Network Time Synchronization systemd-udevd.service loaded active running udev Kernel Device Manager ubuntu.service loaded active running TRYHACK3M udisks2.service loaded active running Disk Manager unattended-upgrades.service loaded active running Unattended Upgrades Shutdown upower.service loaded active running Daemon for power management user@1000.service loaded active running User Manager for UID 1000 user@114.service loaded active running User Manager for UID 114 whoopsie.service loaded active running crash report submission dae⦠wpa_supplicant.service loaded active running WPA supplicant
ubuntu.service loaded active running TRYHACK3M was the obvious one that stood out due to the description
wasnt the name of the suspicious process. but it was the name of the suspicious service name
got the suspicious process name by catting the service by running systemctl cat ubuntu.service
seemed like a cipher maybe since doing intext:"5757314e65474e5962484a4f656d787457544e424e574648555446684d3070735930684b616c70555a7a566b52335276546b686b65575248647a525a57466f77546b64334d6b347a526d685a6255313459316873636b35366247315a4d304531595564476130355864486c6157454a3557544a564e453959556e4a685246497a5932355363303948526a4a6b52464a7a546d706b65466c525054303d" returned writeups only
dcode says ascii code. lets go to cyberchef
did magic. returned bc1qyk79fcp9hd5kreprce89tkh4wrtl8avt4l67qabc1qyk79fcp9had5kreprce89tkh4wrtl8avt4l67qa
need the bitcoin wallet. lets see what a wallet address looks like
need the name of a threat group now. checked the wallet transactions. an incoming transaction of 11 btc. thats alot of money. checked that. got the the wallet id for that and googled it
ābc1q5jqgm7nvrhaw2rh2vk0dk8e4gg5g373g0vz07rā
press release says lockbit ransomware group. thats the name :D