Search for a command to run...

Description missing..
olevba (oletools)python (for XOR decryption)The goal of the challenge was to find the redacted PII (Personal Identifiable Information) parts of the file: case-2025-0412-public.docm.
Analysis of the DOCM and Macro extraction.
Applied a repeating-key XOR to each character (using variables like xorChar and
keyPos).
We opened case-2025-0412-public.docm and extracted its VBA project streams. Using standard OLE‐macro tools "olevba" in oletools, we found a macro named .
PaintItBlackInspection of the module (after MS-OVBA decompression) revealed that all the suspicious fields – "Issued By: ...", "Suspect: ...", "Address: ...", and "External harddrive labeled ..." – were XOR‐obfuscated.
Repeating-key XOR encryption simply XORs the plaintext with a short key, repeating the key as needed.
XOR is its own inverse: if we know any part of the plaintext we can recover the key at those positions
In our case, we recognized plaintext hints ("Detective", "flag", etc.) and brute-forced the 13‐byte XOR key by aligning those guesses against the ciphertext. This yielded the full key, which was then applied to decrypt each field.
Issued By: "Detective Olivia Renshaw, Ravenbrook Police Department."
Suspect: "Victor Langford."
Address: "217 Shadowcrest Ave, Ravenbrook, NX 4078."
External Harddrive label: flag{c48219f5ea9d6bb54f7533edfc1a1124}
flag{c48219f5ea9d6bb54f7533edfc1a1124}