
Step 1:
After downloading the zip file and extracting it. we will find an image jpg file.
By passing the image file to strings command strings squirrel.jpg | less, we will observe a link to download another file.

Step 2:
After downloading the zip file, we will find that it is protected by a password.

So let’s use zip2john tool and see if we are able to crack the password or not.
Getting hash of zip file :

Running rockyou.txt wordlist to crack the password hash

Since I have cracked this hash before so let’s use the --show option to display the password.

Zip file password : squirrel07
Step 3:
Passing EVIL file to file command, we will observe that it can’t recognize the type of it’s data.
So I decided to check the hexdump of this file in order to check the magic bytes of it.
using this command : xxd -g 1 EVIL | less

We will find that the first 4 bytes are corrupted according to the JFIF file signature.

Modifying these bytes by any hexeditor tool, I have used ghex then changed the file extension to EVIL.jfif.
Step 4:
Opening the image file after we have modified the corrupted bytes and changed its extension, we will see a text in top-right corner.

Copying this text and using CyberChef, It will detect that it is a base32 encoding text.

Decoding the text from base32 and we will find the flag : flag{Ev1l_S9uirr3lz}