Forensic
Last step in your analysis. Both hackers use a Command & Control server to manage their botnet.
Our teams are wondering if there are any traces of the URL and login credentials in the RAM of this server.
Author: Worty
Format : Hero{url-user:password}
P.S.: The flag is case sensitive
Hero{nemesis3g2upl4pq6kufc4m.onion-k4nn1b4l:razexP85Inq4}