CATAPULT SPIDER - Much Sad#
This is an OSINT challenge: find the flag in the publically-available information CATAPULT SPIDER has left online.
Challenge description#

We have received some information that CATAPULT SPIDER has encrypted a client's cat pictures and successfully extorted them for a ransom of 1337 Dogecoin. The client has provided the ransom note, is there any way for you to gather more information about the adversary's online presence?
NOTE: Flags will be easily identifiable by following the format
CS{some_secret_flag_text}. They must be submitted in full, including theCS{and}parts.
Solution#
We're given a file to download muchsad.txt:

Two things jump out: a Dogecoin wallet address: DKaHBkfEJKef6r3L1SmouZZcxgkDPPgAoE
and an email address shibegoodboi@protonmail.com. Plugging
shibegoodboi into Google yields a few promising hits: a Twitter account
https://twitter.com/shibegoodboi and a Reddit profile
https://www.reddit.com/user/shibegoodboi/.
Visiting the Twitter page a link to a GitHub repository https://github.com/shibefan:

In shibefan's repositories is one for https://shibefan.github.io.
We can either browse through the repository and view the index.html of the page, or just
visit https://shibefan.github.io:

And there's the flag: CS{shibe_good_boi_doge_to_the_moon}
Answer#
CS{shibe_good_boi_doge_to_the_moon}