Author : hashp4
Here is the writeup of The Proof of the Malware, a cool OSINT challenge categorized as medium during the ESAIP CTF.
After some time without anybody solving the challenge I managed to first blood itš©ø.

Instructions :
We have discovered that a person currently working at Metacortexxs is
developing a powerful virus. Find the proof of the development of this
virus by this employee
Information Gathering - Finding the target
According to the instructions, we are searching for someone who is working at Metacortexxs.
The first idea that came into my mind is to do some research on LinkedIn. To do this, I used a simple Google dork :
site:linkedin.com "megacortexxs"
The first result seemed interesting.

Apparently, there is a certain Noe Trimax working at Metacortexxs as Informatics Specialist. Interesting š. So I went on his profile to find some more informations.

As you can see, I saw there was some additionnal contact informations on his profile.
ā ļø In order to see this, you have to be logged in on a LinkedIn account. Otherwise youāll miss it !

The investigation proceeds with the finding of his email.
n3oth3h4xx0r@protonmail.com
Pivoting - Letās find the malware
I can now pivot on EPIOS. For those who doesnāt know the tool, it is an OSINT search engine that allows performing reverse email search. Using it, I am able to retrieve information linked to an email address without notifying the user.

Thanks to Holehe, we can see that Noeās email is used on two different websites : Github and Twitter. Since we have to find the proof of the development of a virus, the github seems to be the most interesting place. But letās see if I can find something interesting on his Twitter account (like a link to his github profile for example).
Twitter - A (white) rabbit hole
In order to find his Twitter account, I just typed his username : n3oth3h4xx0r

Sadly, thereās nothing interesting on his profile. But I liked his bio. (:
Github - Not stealthy enough, NoƩ
Hereās the tricky part of the challenge. I had to use a technique that is not very well known in order to find his github profile. Because yes, it is actually possible to find a Github username only with the associated email.
To do so, I needed to make a commit on a personal repository with the flag --author. The value of this flag must respect the following format : --author="Name <email@domain.tld>". In this case, I ran the following commands :
git commit --author="Test <n3oth3h4xx0r@protonmail.com>" -m "test"
git push origin main
Then, I went on Github in order to find out Noeās account :

Hmm, so he is the so-called Und3rc0ver-h4xx0r-fr0m-the-m4tr1x. The cover is burnt NoƩ.
By going on his profile, I can see thereās an interesting repo :

The repo called Backdoor-python-polymorph is very suspicious, right ? Letās see whatās in there.

It looks like weāve found our virus development proof here. I was quite chocked when I found out that Linus Torvald was involved though š¢ !
Finding the flag - Commits
Now we have to find the flag. Letās see the commits :

We can see thereās plenty of them. After some manual inspection, the added bin and header one contains what I was looking for : the flag.

Flag : ECTF{N07_7H47_C13V3r_70_137_1NF0rM4710N5_A80U7_Y0Ur531F}
Thanks to the author Hippie for this challenge. It was very entertaining and it was a great opportunity to put some light on this secret github technique.