InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Risen Ransomware — Letsdefend Challange

Ghostploit
InfoSec Write-ups
Published in
4 min readFeb 27, 2025

Hello, my digital adventurers! Today, we will tackle a new LetsDefend challenge about the Risen Ransomware.

Scenario: You are a cybersecurity analyst at a mid-sized tech company. One morning, you receive multiple reports from employees stating that they are unable to access their files. Upon investigation, you discover that all files have been encrypted and appended with a new extension. A ransom note left on the desktop demands payment in cryptocurrency to decrypt the files. The ransomware responsible for this attack is known as Risen Ransomware. Your task is to analyze the Risen Ransomware.

To analyze this ransomware, I will use IDA, which is a powerful disassembler and debugger used for reverse engineering malware.

Analysis

Open IDA and drag and drop the ransomware file into it.

Question 1

Which text file was opened by the malware after initializing a critical section?

To find the answer, we need to consider which function can create and open files. CreateFileW serves this purpose. Malware commonly uses this function to open, create, or manipulate files.

If you look carefully, there is a file named RisenLogs.txt referenced in the CreateFileW call.

Answer: RisenLogs.txt

Question 2

What is the mutex that was created by the malware?

There is a search feature in IDA that we can use. Click on the “Search” tab at the top of the tool and select the “Text” option. Then, type the term you want to search for.

I have searched for mutex and found the following answer:

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Ghostploit

Cybersecurity Engineer | Sharing insights, lab writeups & more for the infosec community | If you want to support me,you can https://buymeacoffee.com/ghostploit

Responses (1)

Write a response

Nice blog