This was a binary exploitation / reversing challenge.
I ran strings cutter and objdump -s -d cutter on the program, but the flag was not stored as a string directly.
I checked the program in ghidra and the string search did not find the flag either. The main function shew something interesting, but I do not understand how the flag is created.
I opened the program in gdp with gef and used disas main to look at the function. I also used steps to look at the function calls. But the program exits upon starting the main function.
I ran the program in ghidra again, set a breakpoint at main before with b main and then used si to look at the registers while the function is running.
HTB{tr4c1ng_th3_c4ll5}
You could have used strace as well, as the flag will appear in the stack: