Mar
18
2026
2

This Creepy Puzzle Arrived In Our Mail (UFJJT1JJVEFJUkUK)

This is the original article about UFJJT1JJVEFJUkUK puzzle.

UFJJT1JJVEFJUkUK creepy puzzle arg mystery package from poland

A recent afternoon, I was suddenly interrupted when typing away at my battle station in the office.

– “GadgetZZ got some mail, here you go.”

I stared at the package in disbelief and felt a sudden shift in the atmosphere. The package stood out like a sore thumb, and I got a feeling of something eerily familiar.

My first thought, as always, was skepticism and I started to inspect the package. Handwritten, addressed to GadgetZZ sent from Poland, stamped in Otwock and had no return address.

Inside was the package was a CD in a paper sleeve, on the sleeve was handwritten Base64 (immediately recognized as Base64 due to the string ending in = ).

Q1JJVElDQUxMWUlNUE9SVEFOVAo= mystery cd dvd base64

Then on the CD itself was what looked to be parts of a Hex string written, either hinting that a part was missing or at that missing part, visualized by three dots deliberately placed between the groups.

mystery cd dvd hex 06 FD 0A 02 E9 F2 3D 3A 32 01 AF 26 72 10 B86E2E CA DE 92

If you didn’t make the connection yet, this both feels and looks like that mysterious CD that Johny received in 2015, just like this one it was from Poland and had Base64 scribbled on it. That took a viral turn and is known as 11B-X-1371. In case you missed it, that is a whole other rabbit hole.
https://gadgetzz.com/2015/10/12/this-creepy-puzzle-arrived-in-our-mail/
https://en.wikipedia.org/wiki/11B-X-1371

11B-X-1371 Parker Warner Wright pww 11B-3-1369 plague doctor mystery creepy puzzle

One thing is clear, I need to know, what is on that disc? Tempting, but I am not going to pop this in blindly. I started to prepare a machine with some basic digital forensics in mind that will be kept isolated and offline. As I chose my victim (laptop) and started to run dd 0 for good hygiene as I was digging around for a CD reader.

Suddenly there I was, laptop ready with the disc in hand. I pop the disc in and created a copy of the disk with FTK Imager.
Finally, we can have a look at the data.

Before I go any further, I will say that what was on this disc is beautiful and hard to do justice in words. What comes to mind is CICIDA puzzle, steganography and general feeling of something unknown hiding in plain sight. If you want to enjoy this mystery in its full glory without any spoilers, stop reading now. I will provide a link to a dropbox below to the image of this disk and all the raw data.

Dropbox link

Below I will share what I found on this disc, I am sure I missed plenty and I might have got some things wrong. This is my very first hands on experience with steganography puzzles. I got more caught up than I could’ve imagined and it did make me take a break from my recent obsession with lock picking. I will also try to keep short and not get too technical. This is what I found after hitting countless of dead ends, digging in Ghidra and getting completely lost, this was HARD.

Here we go!

Investigation

We have the Base64 on the disc sleeve “Q1JJVElDQUxMWUlNUE9SVEFOVAo=”, this translates to “CRITICALLYIMPORTANT”. The disc is in UDF format with the name “UFJJT1JJVEFJUkUK” which is Base64 that translates to “PRIORITAIRE”. Cyberchef was helpful here.

Here is an entropy graph of the disc from binwalk.

image entropy mystery data binwalk UFJJT1JJVEFJUkUK MESSAGE.001 MESSAGE.002 MESSAGE.003 MESSAGE.004 MESSAGE.005 MESSAGE.006

The disc has 6 files indexed, MESSAGE.001, MESSAGE.002, MESSAGE.003, MESSAGE.004, MESSAGE.005, MESSAGE.006. I could not find any hidden sessions of other data on this disc, someone else might have better luck.

ls -la mystery image UFJJT1JJVEFJUkUK MESSAGE.001 MESSAGE.002 MESSAGE.003 MESSAGE.004 MESSAGE.005 MESSAGE.006

Before I start going through the files, I ran exiftool on everything, digging around in unknown tags. I only found one thing that stood out, which can be found repeatedly in this dataset. The metadata has been scrubbed/altered. The date 02 feb 2002 02:02:02, is constantly present.

exif exiftool metadata MESSAGE.001 UFJJT1JJVEFJUkUK mystery

MESSAGE.001 and MESSAGE.002

Now let’s start with MESSAGE.001 and MESSAGE.002. These are text files, that at first glance looks to contain an identical poem but one file is larger than the other. I ran vimdiff on them and that showed MESSAGE.002 was riddled with non-printable characters, like zero width joiners.

UFJJT1JJVEFJUkUK MESSAGE.002 MESSAGE.001 vimdiff poem hidden cipher

So, I opened MESSAGE.002 and stripped away everything except these anomalies, it wasn’t until later I made the connection that the poem itself was most likely a hint to these zero width joiners. I ended up with 24 groups that consisted of 8 characters.

UFJJT1JJVEFJUkUK MESSAGE.001 MESSAGE.002 zero width poem cipher base4

There is 4 different characters used. Zero width joiner (U+200D), zero width non-joiner (U+200C), zero width space (U+200B) and pop directional formatting (U+202C). So 4 values, let’s try base4. I gave them values of 0-3 depending on their frequency, starting with 0 for the most frequent character. Voila, I got something?

00001110
00001020
00001011
00001002
00001030
00001033
00001003
00001023
00001033
00001012
00001003
00001020
00001001
00001021
00001032
00001103
00001021
00001103
00001020
00001001
00001003
00001023
00001011
00001010

After some dead ends, I saw the pattern and assumed the consistency of the zeros in each group was just padding, so they are out. Now after translating the first groups of base4 to decimals, those numbers were in the perfect range for actual human friendly ASCII letters. Translating the whole thing revealed the following: “THEBLOCKOFCHAINSISHACKED”

UFJJT1JJVEFJUkUK MESSAGE.002 MESSAGE.001 zero width cipher base4 decimal ascii decode

MESSAGE.003

Let’s continue with MESSAGE.003. This one I did not spend very much time with; it’s public PGP key block. Maybe the creator is going to say hello at some point? Inspecting this key, we can see the date mentioned earlier again, but also the fingerprint for the key, it’s a perfect match for the partial string written on the CD.

06 FD 0A 02 E9 F2 3D 3A 32 01 AF 26 72 10 B8 6E 2E CA DE 92

UFJJT1JJVEFJUkUK MESSAGE.003 public pgp key 06 FD 0A 02 E9 F2 3D 3A 32 01 AF 26 72 10 B86E2E CA DE 92

MESSAGE.004

Moving on to MESSAGE.004. This file is also connected to MESSAGE.006 in my mind. MESSAGE.004 is a file with an unknown format and no extension, trying to look at the header you can see “v1.49…”, that didn’t tell me much.

UFJJT1JJVEFJUkUK MESSAGE.004 mystery unknown file v1.49y v1.49 Pico Picocrypt

The entropy of this file is towards the encrypted part of the scale. MESSAGE.006 is just a text file again, this time it is just poem, nothing hidden so the importance must be in the actual poem. It’s about a dog named Pico. A few searches later I have Picocrypt v1.49 installed on my machine, ran a few tests and I am certain that this is encrypted with Picocrypt v1.49, but it needs a password which I have not yet been able to figure out, yet.

picocrypt 1.49 MESSAGE.004

MESSAGE.005

Lastly, we have the beast that is MESSAGE.005. This is where the rabbit hole suddenly got really deep, really fast. So far, I have been having a jolly time doing some minor ciphers and extracting what I deemed as valuable data, this file swept the carpet form under my feet, and I was not ready for it. This is a mpeg file complied with ffmpeg. There is no soundtrack, only one video track which visually looks like white noise and chaos.

UFJJT1JJVEFJUkUK MESSAGE.005 mysteryvideo mpeg

This had me scratching my head, and I did some surface reading on hiding messages in videos. I hit some dead ends trying to find special frames by both extracting all the frames and only the I-frames, stacking all frames into 1 picture and so on.

UFJJT1JJVEFJUkUK myster video MESSAGE.005 frames

The format mpeg, it’s a lossy format, that though relevant or not made me take a step back. At this point I had already figured out that video was in only black and white pixels flickering on/off, is this binary? Well wouldn’t you know, converting a first test part I think there is a pattern, which lead me to eventually extract the whole thing focusing on the macroblocks, 16×16.

Inspecting the output of the hacked-up Python script for this task, of course I expected nothing. I was met with an XZ header, unbelievable.

UFJJT1JJVEFJUkUK MESSAGE.005 xz archive header

Because the data stream from the video ended a few frames before the actual end of the video, the last few frames were black. End of file will be broken and most archive tools will complain about this. There are some ways around this, I decided to keep going with Python and used lzma decompressor, ignore the missing end of file and forcefully open this thing.

UFJJT1JJVEFJUkUK MESSAGE.005 xz archive

Here we go, another file hiding inside. Immediately recognized as a JPEG file. I am in disbelief, both equally shocked and humbled by whoever created this thing and my own ability, both underestimated.

UFJJT1JJVEFJUkUK MESSAGE.005 qr code onion address TOR

Let’s dive into the next layer; the QR code holds a valid onion address. There is no way this is a coincidence. Fired up TOR and took a peek. The first time I visited this address, it was offline but still valid. Only a few hours later, I thought “oh I just want to look at the http request/responses, maybe I missed something”. But to my surprise this time I see “200 OK”, well hello there, there now is a server alive on the address.

Final thoughts

It’s either here or before all my spoilers that I hope that someone more capable can continue to dig at this mystery. There are some strings, a date, encrypted file and a TOR site I feel like there is much left to learn. Finally, I will share my initial probing of the TOR site, I did not find much, but hey maybe that itself says something? Maybe there will be something completely different in the future?

Here is the normal response, content-length 0 and set ut UTF-8.

UFJJT1JJVEFJUkUK tor onion curl response

Sent a TRACE.

UFJJT1JJVEFJUkUK tor onion curl response

Finally here is the server throwing a 400, it was a from CONNECT I think.

UFJJT1JJVEFJUkUK tor onion curl response

All the best,
V