| Module 0: Windows Binaries | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Brief): Compiling & Building Executables | 10 | 157% | TTuma JGutierrez TSuarez |
| Class 2 (Brief): Windows Executables Format | 10 | 132% | TTuma JGutierrez TSuarez |
| Class 3 (Brief): Windows Loader | 10 | 129% | TTuma JGutierrez TSuarez |
| Class 4 (Brief): .NET Assemblies | 10 | 121% | TTuma JGutierrez TSuarez |
| Class 5 (Lab): Windows Binaries Example | 10 | 100% | TTuma JGutierrez TSuarez |
| Module 1: Dynamic Analysis | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Brief): Malicious Software 101 | 20 | 93% | TTuma JGutierrez TSuarez |
| Class 2 (Brief): Analysis Lab & Tools | 20 | 89% | TTuma JGutierrez EPlatero |
| Class 3 (Lab): Sandbox Analysis | 20 | 86% | TTuma JGutierrez EPlatero |
| Class 4 (Lab): Analysis Inside a Virtual Machine | 20 | 82% | TTuma TSuarez EPlatero |
| Class 5 (Brief): Process and Network Monitoring | 30 | 86% | TTuma JGutierrez EPlatero |
| Module 2: Tools Arsenal | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Brief): PE Editors & Process Explorer | 30 | 75% | TTuma JGutierrez EPlatero |
| Class 2 (Brief): WinDbg, IDA Pro & Qilinq | 30 | 75% | TTuma JGutierrez EPlatero |
| Class 3 (Chall): PE Editors Exercise | 30 | 71% | TTuma TSuarez EPlatero |
| Class 4 (Lab): Debuggers & Disassemblers | 40 | 64% | TTuma JGutierrez TSuarez |
| Class 4.1 (Chall): Debuggers & Disassemblers | 41 | 68% | TTuma JGutierrez TSuarez |
| Class 5 (Lab): Wireshark 101 | 46 | 71% | TTuma TSuarez JGutierrez |
| Class 5.1 (Lab): Fakenet 101 | 46 | 71% | TTuma JGutierrez TSuarez |
| Class 5.2 (Lab): Inetsim 101 | 46 | 68% | TTuma JGutierrez TSuarez |
| Module 4: Packers & Obfuscators | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Brief): Carnita Methodology | 50 | 61% | TTuma JGutierrez TSuarez |
| Class 2 (Brief):Unpacking & Deobfuscation Strategy | 50 | 57% | TTuma JGutierrez FShiniti |
| Class 3 (Lab): Unpacking UPX | 55 | 50% | TTuma JGutierrez FShiniti |
| Class 3.1 (Lab): Unpacking UPX | 55 | 54% | TTuma JGutierrez HCherifi |
| Class 4 (Lab): Unpacking ASPack | 56 | 54% | TTuma JGutierrez HCherifi |
| Class 4.1 (Lab): Unpacking ASPack | 56 | 50% | TTuma JGutierrez HCherifi |
| Class 4.2 (Lab): Unpacking ASPack | 57 | 50% | TTuma JGutierrez HCherifi |
| Class 5 (Chall): Unpacking UPX your way | 65 | 46% | TTuma JGutierrez HCherifi |
| Class 6 (Chall): Unpacking for Flag | 75 | 46% | JGutierrez TTuma HCherifi |
| Module 5: Aniti-Malware Tricks | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Brief): Anti-Debugging | 68 | 43% | JGutierrez TTuma HCherifi |
| Class 2 (Brief): Anti-VM and Packers | 69 | 43% | JGutierrez TTuma HCherifi |
| Class 3 (Brief): Process Injection | 70 | 43% | JGutierrez TTuma HCherifi |
| Class 4 (Lab): Anti-Debugging Ticks | 71 | 39% | JGutierrez TTuma HCherifi |
| Class 4.1 (Chall): Patch the Binary | 75 | 39% | JGutierrez TTuma HCherifi |
| Class 4.2 (Chall): Find the Offset | 76 | 36% | JGutierrez TTuma HCherifi |
| Class 5 (Lab): Anti-Malware Ticks | 78 | 36% | JGutierrez TTuma HCherifi |
| Module 6: Process Injection | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Lab): CreateRemoteThread Technique | 75 | 39% | JGutierrez TTuma HCherifi |
| Class 2 (Lab): SetThreadContext Technique | 75 | 39% | JGutierrez TTuma HCherifi |
| Class 2.1 (Lab): SetThreadContext Technique | 75 | 43% | JGutierrez TTuma HCherifi |
| Class 3 (Chall): Find the Window | 80 | 39% | JGutierrez TTuma HCherifi |
| Class 3.1 (Lab): Fighting Process Injection with x32dbg | 85 | 36% | JGutierrez TTuma HCherifi |
| Class 4 (Chall): Find the Shellcode | 95 | 39% | JGutierrez TTuma HCherifi |
| Class 5 (Chall): Intercept the Shellcode | 100 | 39% | JGutierrez TTuma HCherifi |
| Module 8: Dissecting Infostealers like a BOSS | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Lab): Scripts 101 | 90 | 29% | JGutierrez TTuma HCherifi |
| Class 2 (Lab): Dissecting BAT Downloader | 90 | 29% | JGutierrez TTuma HCherifi |
| Class 3 (Lab): Dissecting Powershell Dropper with NeZa | 90 | 29% | JGutierrez TTuma HCherifi |
| Class 3.1 (Lab): Dissecting Powershell Dropper | 90 | 29% | JGutierrez TTuma HCherifi |
| Class 4 (Lab): Dissecting JavaScript Chrome Extension | 91 | 29% | JGutierrez TTuma HCherifi |
| Class 4.1 (Lab): Dissecting JavaScript Chrome Extension | 91 | 29% | JGutierrez TTuma HCherifi |
| Class 4.2 (Lab): Dissecting JavaScript Chrome Extension | 91 | 29% | JGutierrez TTuma HCherifi |
| Class 5 (Chall): Dissecting Infostealer | 120 | 29% | JGutierrez TTuma HCherifi |
| Class 5.1 (Chall): Dissecting the Plugin | 150 | 29% | JGutierrez TTuma HCherifi |
| Module 9: Fighting Ransomware | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Lab): Intercepting RSA key with NeZa | 100 | 29% | JGutierrez TTuma HCherifi |
| Class 2 (Lab): Intercepting AES key with NeZa | 100 | 29% | JGutierrez TTuma HCherifi |
| Class 3 (Lab): Unhooking a locked machine with NeZa | 110 | 29% | JGutierrez TTuma HCherifi |
| Class 4 (Lab): Reversing Ryuk Ransomware with IDA | 120 | 29% | JGutierrez TTuma HCherifi |
| Class 4.1 (Lab): Recovering Ryuk Files with NeZa | 120 | 29% | JGutierrez HCherifi TTuma |
| Class 5 (Chall): Restoring Locked Keyboard | 130 | 29% | HCherifi JGutierrez TTuma |
| Class 6 (Chall): Recovering Encrypted Machine | 200 | 29% | HCherifi TTuma JGutierrez |