Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

FakeGPT

Malware Analysis

easy

Analyze a malicious Chrome extension's code and behavior to identify data theft mechanisms, covert exfiltration via `<img>` tags, and anti-analysis techniques.

XWorm

Malware Analysis

medium

Analyze malware behavior to identify persistence methods, evasion techniques, and C2 infrastructure by extracting artifacts and configuration data from static and dynamic analysis.

GetPDF

Malware Analysis

medium

Reconstruct a multi-stage PDF malware attack by analyzing network traffic, dissecting PDF objects, deobfuscating JavaScript, and emulating shellcode to identify payloads and exploited CVEs.

Obfuscated

Malware Analysis

medium

Deobfuscate multi-stage VBA and JavaScript malware from a Word document, extracting IOCs and reconstructing execution flow with Oledump, CyberChef, and WSH.

Emprisa Maldoc

Malware Analysis

medium

Reconstruct fragmented shellcode from a malicious RTF document and emulate its execution using `rtfdump.py` and `scdbg` to identify CVE-2017-11882 payload delivery.

XLM Macros

Malware Analysis

medium

Analyze Excel 4.0 macros using XLMDeobfuscator and OLEDUMP to identify anti-analysis techniques and subsequent stage download attempts.

MalDoc101

Malware Analysis

medium

Analyze obfuscated scripts to identify malicious infrastructure, specifically extracting the first FQDN used to download a trojan, enhancing skills in threat hunting and incident response.

RE101

Malware Analysis

medium

Analyze diverse file types including binaries, obfuscated scripts, and corrupted archives using tools like Cutter, hex editors, and debuggers to extract hidden flags and reverse custom encryption.

RotaJakiro

Malware Analysis

hard

Reverse engineer and analyze RotaJakiro Linux malware using Ghidra, strace, and Wireshark to identify persistence, anti-analysis, and C2 mechanisms.

Ransomed

Malware Analysis

hard

Reconstruct advanced malware execution by performing dynamic analysis and memory forensics to diagnose process hollowing, dynamic API resolution, and string obfuscation.

Flareon 4

Malware Analysis

hard

Integrate diverse reverse engineering tools and techniques to synthesize solutions for advanced, multi-platform malware analysis challenges.

Phobos

Malware Analysis

insane

Analyze the Phobos ransomware executable to identify its core behavior, encryption methods, and extract actionable indicators of compromise (IOCs).

UnPackMe

Malware Analysis

insane

Analyze packed ShadowSteal malware using dynamic and static reverse engineering to extract the RC4 key, mutex, and self-deletion command.

$tealer

Malware Analysis

insane

Reverse engineer advanced stealer malware, identifying PE structure, dynamic API resolution, anti-analysis techniques, and RC4 string decryption to extract C2 IOCs using IDA Pro and CAPA.

Flareon 3

Malware Analysis

insane

Analyze and reverse engineer complex malicious challenges using static and dynamic analysis tools to uncover hidden functionality and extract IOCs.

Flareon 5

Malware Analysis

insane

Synthesize advanced reverse engineering techniques to analyze complex malicious binaries and extract hidden flags using IDA Pro, debuggers, and specialized tools.

Flareon 6

Malware Analysis

insane

Reverse engineer diverse, obfuscated malware samples using static and dynamic analysis tools to identify functionality and extract embedded artifacts.

Flareon 7

Malware Analysis

insane

Synthesize advanced static and dynamic analysis techniques using IDA Pro and debuggers to solve complex reverse engineering challenges.

Flareon 1

Malware Analysis

insane

Determine hidden flags and program logic by reverse engineering unknown binaries using static and dynamic analysis tools.

Flareon 2

Malware Analysis

insane

Reverse engineer multi-stage malicious binaries using IDA Pro and debuggers to uncover hidden functionality and extract embedded flags.