Description

Solution

We’re presented with a zip file.

[ihuomtia@pc plc]$ ls  
Diamond_Hands_Crypto_Casino.zip

Let’s extract it and see what’s inside.

[ihuomtia@pc plc]$ unzip Diamond_Hands_Crypto_Casino.zip    
Archive:  Diamond_Hands_Crypto_Casino.zip  
  creating: Diamond Hand's Crypto Casino.app/  
 inflating: __MACOSX/._Diamond Hand's Crypto Casino.app     
  creating: Diamond Hand's Crypto Casino.app/Contents/  
 inflating: __MACOSX/Diamond Hand's Crypto Casino.app/._Contents     
  creating: Diamond Hand's Crypto Casino.app/Contents/_CodeSignature/  
 inflating: __MACOSX/Diamond Hand's Crypto Casino.app/Contents/.__CodeSignature
 [...]
Casino.app/Contents/Frameworks/Squirrel.framework/Versions/Current -> A  
 Diamond Hand's Crypto Casino.app/Contents/Frameworks/Mantle.framework/Versions/Current -> A

As we can see there are two folders, let’s check the folder “Diamond Hand’s Crypto Casino.app”.

[ihuomtia@pc plc]$ ls  
"Diamond Hand's Crypto Casino.app"   __MACOSX

Here we have a bunch of more folders, after checking them out the most interesting one seems to be the “Resources” folder.

[ihuomtia@pc plc]$ cd Diamond\ Hand\'s\ Crypto\ Casino.app/  
[ihuomtia@pc Diamond Hand's Crypto Casino.app]$ ls  
Contents  
[ihuomtia@pc Diamond Hand's Crypto Casino.app]$ cd Contents/  
[ihuomtia@pc Contents]$ ls  
_CodeSignature  Frameworks  Info.plist  MacOS  PkgInfo  Resources  
[ihuomtia@pc Contents]$ cd ..  
[ihuomtia@pc Diamond Hand's Crypto Casino.app]$ cd ..  
[ihuomtia@pc plc]$ cd Diamond\ Hand\'s\ Crypto\ Casino.app/Contents/  
[ihuomtia@pc Contents]$ ls  
_CodeSignature  Frameworks  Info.plist  MacOS  PkgInfo  Resources  

The file app.asar stands out from the rest, let’s check it out

INFO

ASAR stands for “Asynchronous JavaScript and XML” (AJAX) Simplified ARchive, and it is a simple archive format used primarily by Electron applications. Electron is a framework for building cross-platform desktop applications using web technologies like JavaScript, HTML, and CSS.

[ihuomtia@pc Contents]$ cd Resources/
[ihuomtia@pc Resources]$ ls  
[...]
app.asar
[...]

After a little bit of research it appears that we can extract this file using the asar utility, after installing it we can extract the content of app.asar.

[ihuomtia@pc Resources]$ asar e app.asar    
error: missing required argument 'dest'  
[ihuomtia@pc Resources]$ asar e app.asar app  
[ihuomtia@pc Resources]$ ls  
[...]
app
app.asar
[...]

We can see that we have a bunch of Javascript files and web related documents.

[ihuomtia@pc app]$ ls  
forge.config.js  icon.icns  index.html  main.js  node_modules  package.json  prod.js  renderer.js  style.css

After checking main.js, there seems to be a command that executes only when the host is running MacOS.

[ihuomtia@pc app]$ cat main.js    
const { app, BrowserWindow } = require("electron");  
const path = require("path");
[...]
async function runMacOS() {  
 doCommand(  
   "echo U2FsdGVkX18dLoy5VJmru0jW8cEVgMQS5JYhHSk8D369laaZ7d7nBJXslDqS4CFoqIfwoKGM6Urhmx079RXgIA== | openssl enc -aes-256-cbc -d -a -pass pass:infected"  
 );
 [...]
 app.on("activate", () => {  
 if (BrowserWindow.getAllWindows().length === 0) {  
   createWindow();  
 }  
});

Basically executing the same command reveals the flag.

[ihuomtia@pc app]$ echo U2FsdGVkX18dLoy5VJmru0jW8cEVgMQS5JYhHSk8D369laaZ7d7nBJXslDqS4CFoqIfwoKGM6Urhmx079RXgIA== | openssl enc -aes-256-cbc -d -a -pass pass:infected
flag{6d0560223d733e5a6761476f8d23b4e3}

And here’s the flag: flag{6d0560223d733e5a6761476f8d23b4e3}