The file is of interest. It looks like its a Windows application called ScreenSpy.
In Wireshark you can export the executable at File > Export Objects > HTTP and choose the file:
(tcp stream 1) shows this:
tcp stream 5, which is the last stream, contains a lot of data that looks like a bunch of base64 encoded strings. We can also see some malicious powershell commands.
After dissecting some of the code, we find this: 0r3d_1n_7h3_h34dqu4r73r5}
I extracted the exe file and found a version.txt that she me that the file was a Client for EZRAT 0.1.6.1
I found this in the .text file: Very_S3cr3t_S
I loaded the file in Ghidra. I only found the string above there.
So far I think we have this: Very_S3cr3t_S 0r3d_1n_7h3_h34dqu4r73r5}
It came to mind that the Executable is EZRAT 0.1.6.1 and that the traffic of it might be encrypted. And indeed, checking the application on Github, I found an encryption function. I also noticed that its a C# application, which means that I could easily decompile the downloaded application and potentially read the encrpytion key.
ilSpy can be used to decompile the file, but it is only available for Windows.
A friend wrote a decryptor. The encryption key and IV could be found in the decompiled executable.
Decrypting the TCP stream 5, which is the C2 communication, we find an ssh key that contains the last part of the flag: