Unraveling a REMOTE ACCESS TROJAN (VBScript Deobfuscation)

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ต.ค. 2022
  • MASSIVE thank you to Snyk for sponsoring this video -- try Snyk FOR FREE and find vulnerabilities in your own code! j-h.io/snyk
    Help the channel grow with a Like, Comment, & Subscribe!
    ❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
    Check out the affiliates below for more free or discounted learning!
    🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
    💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
    🐜Zero2Automated ➡ Ultimate Malware Reverse Engineering j-h.io/zero2auto
    🐜Zero2Automated ➡ MISP & Malware Sandbox j-h.io/zero2auto-sandbox
    ⛳Point3 ESCALATE ➡ Top-Notch Capture the Flag Training j-h.io/escalate
    👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
    📗Humble Bundle ➡ j-h.io/humblebundle
    🐶Snyk ➡ j-h.io/snyk
    🤹‍♀️SkillShare ➡ j-h.io/skillshare
    🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
    📧Contact me! (I may be very slow to respond or completely unable to)
    🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
    🚩 CTF Hosting Requests ➡ j-h.io/ctf
    🎤 Speaking Requests ➡ j-h.io/speaking
    💥 Malware Submission ➡ j-h.io/malware
    ❓ Everything Else ➡ j-h.io/etc

ความคิดเห็น • 152

  • @asbestinuS
    @asbestinuS ปีที่แล้ว +359

    I'm loving these deobfuscation videos, please do more of them. I don't really care which malware it ends up being, I love to see your thought process and deobfuscation techniqes and so on.

    • @nordgaren2358
      @nordgaren2358 ปีที่แล้ว +8

      Same! I love the deobfuscation videos, and I don't care if it's a new malware or not!
      The process of getting there is what intrigues me, not the outcome. If it's some new malware we have never seen, then bonus!

    • @FVT-tn8ji
      @FVT-tn8ji ปีที่แล้ว +2

      Same here, I dont really understand that much but his process of understanding this program is really interesting to me!

  • @plut4580
    @plut4580 ปีที่แล้ว +173

    OH YES, finally some malware analysis, i love your content and i’m learning so much, unfortunately i gotta do some homework first! Don’t stop making videos.

  • @TriSept
    @TriSept ปีที่แล้ว +61

    Your deobfuscation videos are my favorites. Definitely want to see more of these!

  • @infidon9229
    @infidon9229 ปีที่แล้ว +3

    had absolutely no idea what was going on, but I was still very entertained and had no problem watching this in one sitting. hoping to start to catch on/understand small things as I keep watching videos like this. Banger video, ty john

  • @calvinstar356
    @calvinstar356 ปีที่แล้ว +31

    Love these videos, you are 100% correct that this type of analysis is much easier to follow for beginners then binary in Ida. Keep up the great work John, love the content

  • @alanc12402
    @alanc12402 ปีที่แล้ว

    Great video there John! It's great seeing your process and it's educational! Even if it's malware we've seen before, the process is super important.

  • @briank8525
    @briank8525 ปีที่แล้ว +1

    Outstanding John. I agree with the comments below. I learn so much by watching you and taking notes as well.

  • @sokai6475
    @sokai6475 ปีที่แล้ว +9

    Dude, I love watching your malware analysis vids. By no means should you stop doing them. I especially appreciate how you're able to bounce between different programming languages and explain to your audience how the lines of code work and so forth. You've made it very interesting to me and as a layman who is trying to get into cybersecurity, this is very informative. Keep up the good work!

  • @cojocaru08
    @cojocaru08 ปีที่แล้ว +1

    I love these deobfuscation videos. And yes, that execute global override was neat

  • @z0mn1a
    @z0mn1a ปีที่แล้ว +5

    Beside learning the very basics of code, I like to watch your analysis videos as a way of reminding myself why I'm learning this stuff. Watching you do this is like watching someone disarm a bomb. You have me on the edge of my seat the whole time, even though I only understand about 30% of what your saying. Please keep making these videos. And keep them long!!!

  • @Alex-qx1gx
    @Alex-qx1gx 11 หลายเดือนก่อน

    I loved the video - happy TH-cam recommended it for me. I enjoyed seeing your thought process a lot, even if VBS is not a programming language I know.

  • @sraven3671
    @sraven3671 ปีที่แล้ว +1

    That was awesome, love your work - you're a legend!

  • @DexCode1337
    @DexCode1337 ปีที่แล้ว +4

    finally a new malware analysis video! more like this please!

  • @GratuityMedia
    @GratuityMedia ปีที่แล้ว +1

    Its so cool to watch you Deobfuscate. Great thinking exercise for the morning.

  • @JeffGolenia
    @JeffGolenia ปีที่แล้ว

    I too am loving these videos. Far beyond by programming abilities but it's really nice to see how it's done.

  • @duscraftphoto
    @duscraftphoto ปีที่แล้ว +1

    Great deobfuscation content, as usual! Keep up the amazing work!

  • @liamwhalen
    @liamwhalen ปีที่แล้ว +6

    Cool to see a thought process in effect and helpful to share techniques for all to learn from. I really liked the feeling expressed when you found the new technique with the Execute stuff. That feeling is one of the things that makes this sort of work worth the while. I wonder if the first part that stops execution entirely is the value added work to the old VBA script? Maybe something needs to be present on the machine in order for the trojan to execute. There may be some value to security through obscurity.

  • @Thoraxe12
    @Thoraxe12 ปีที่แล้ว

    I don't know if you will see this but as a newer programmer this was amazing to watch. I have never tried or seen obfuscation in a real life example and it was just amazing. I thought this was so much harder then it really is and makes me want to try to do this myself. Please do more because this got me excited just to go program again even though my current project is killing me XD

  • @charlieisacatwithseizures
    @charlieisacatwithseizures ปีที่แล้ว +1

    As someone who wants to become a malware analyst, please make more of these videos. They are great practice and examples so that when I try to do it myself, i can look back at the thought process and get my head in the right mode to think critically.

  • @jimsmind3894
    @jimsmind3894 ปีที่แล้ว +1

    Although it was a dud, still enjoyed. This is my favourite sort of stuff you do, your knowledge of different languages is impressive!

  • @Ryoushin
    @Ryoushin ปีที่แล้ว +1

    gotta love deobfuscating acbogs, great video!

  • @LexiLominite
    @LexiLominite ปีที่แล้ว +5

    I think most of the people dont care what is the end result of the video. But many people will like the thought process of you on deobsfucating things. This is nice. Glad that you uploaded it 🙂

  • @speeder3235
    @speeder3235 ปีที่แล้ว

    yoo more deobfuscation
    Missed those dearly, thanks for gifting us another one of these videos!

  • @stavros222
    @stavros222 ปีที่แล้ว +3

    I love that when you see names like hexadecimal values or strange names like AAAAAAA or whatever is 100% a malicious code

  • @msalih
    @msalih ปีที่แล้ว +1

    Awesome. Overriding the eval function with echo really cool 😂

  • @not4real920
    @not4real920 ปีที่แล้ว

    I agree - i get more out of the thought process vs. which malware it actually is

  • @verolyn8459
    @verolyn8459 ปีที่แล้ว +1

    Man, I'm waiting for it and now its back.. New video, New Learnings.

  • @jojobobbubble5688
    @jojobobbubble5688 ปีที่แล้ว

    Interesting stuff. Super new to all of this but I'm enjoying it as I learn

  • @danf4321
    @danf4321 ปีที่แล้ว +1

    Great video as always!

  • @AngryMarkFPV
    @AngryMarkFPV ปีที่แล้ว

    Such a good teacher, keep it up mate. I feel smarter every day (pun almost intended) when I watch these.

  • @henryfrere8680
    @henryfrere8680 ปีที่แล้ว

    I really love these videos. I wish I had the motivation to learn more about this stuff. One day!

  • @bijss1595
    @bijss1595 ปีที่แล้ว +3

    These videos are the best to watch :) doesnt matter we've seen the rat before. Always learn new stuff from your videos! Keep it up :)

  • @Defotowe
    @Defotowe ปีที่แล้ว

    John is back with the content we all crave, love it .

  • @patrickwootang
    @patrickwootang ปีที่แล้ว

    Thanks for being a great teacher!

  • @truenerthus4460
    @truenerthus4460 ปีที่แล้ว

    Please do more of this. Great content

  • @williamist
    @williamist ปีที่แล้ว

    love this type of content!

  • @slackerbelmont
    @slackerbelmont ปีที่แล้ว +1

    Even if the end result is something that you've seen before, the process of getting to that point is most of the reason that I watch.

  • @xthukuh
    @xthukuh 3 หลายเดือนก่อน

    I like the thought process.

  • @DavidCosta85
    @DavidCosta85 ปีที่แล้ว

    thank you for the knowledge sharing. blessings

  • @gijsyo
    @gijsyo ปีที่แล้ว

    This was really fun to watch

  • @hishamtarsoo5233
    @hishamtarsoo5233 ปีที่แล้ว

    Great video John!

  • @zdazeeeh
    @zdazeeeh ปีที่แล้ว

    These vids are always my fave

  • @waxnet
    @waxnet ปีที่แล้ว

    Finally I love these videos

  • @Soup69God
    @Soup69God ปีที่แล้ว

    huge fan of these videos!

  • @Kiesp
    @Kiesp ปีที่แล้ว +11

    I don't mind it not being something new. It's great to see you decode and deobfuscate random stuff :D
    When saving a file in Notepad++ (and a lot of other programs) just add " around the filename, so you don't have to pick it manually ^^ So call it "experiment.vbs" and it'll save as a vbs file :D

    • @1stAshaMan
      @1stAshaMan ปีที่แล้ว +2

      You can also just scroll up 1 line in the file type box to select "All Types (*.*)"
      As long as you have an extension in your file name it'll save as that type
      I always wondered why they didn't just have it default to the type you enter when you put in a file extension

  • @MrGattor33
    @MrGattor33 ปีที่แล้ว

    Great deobfuscation content! Keep up the Great work John!
    Just curious as to why you couldn't run this on a separate machine or in a VM and see what the whole thing really does before breaking it down like you have here.

  • @hm-jr4ok
    @hm-jr4ok ปีที่แล้ว

    I enjoyed watching this!

  • @YouKnowTGreen
    @YouKnowTGreen ปีที่แล้ว +1

    lol still so kool to watch John videos even though i have no idea on how to do the deobfuscation but John make you feel like you watching a movie

  • @santiagofonzo9336
    @santiagofonzo9336 ปีที่แล้ว +2

    Thank you John for making these videos! This is how you get someone to change his career from chemistry to cybersec haha 😂. So interesting 🙌🏻

  • @hartlink
    @hartlink ปีที่แล้ว +1

    Hola, don't feel bad about the ending for us was entertainment, fun and educative, thanks for sharing this kind of content, keep it up!

  • @The_Fancy_Duck
    @The_Fancy_Duck ปีที่แล้ว +10

    I find this relaxing and educational, like you can just put this on in the back ground or something.

  • @GhostOfAnubis09
    @GhostOfAnubis09 ปีที่แล้ว

    Sure it's 'just' houdini again. But that was a really slick trick to overwrite executeglobal, so thanks for that at the very least!

  • @Octomany
    @Octomany ปีที่แล้ว

    Haha that "Yeeaahhh" of pure satisfaction at 27:35, love it.
    Nice trick by the way, thanks for sharing!

  • @danomaly8943
    @danomaly8943 ปีที่แล้ว

    I'm learning a lot from these videos. Honestly it is a little disappointing that it's the same thing because it seems like they are being taught similar methods to hide the code however for me just getting into this it is helpful to know that people can use the same thing in different ways. On the other hand I think we all want to find something interesting or especially nefarious because that's exciting.

  • @justindeleon9074
    @justindeleon9074 ปีที่แล้ว

    what a cool freaking channel. Subbed and liked.

  • @Gersberms
    @Gersberms ปีที่แล้ว +2

    Notepad++ is such a tease. It looks so helpful, but I hate it every time I use it. Get VS Code. I'm really surprised VBS lets you use apostrophes as well as quotes!

  • @lukebremer5647
    @lukebremer5647 ปีที่แล้ว +4

    I am disappointed you didn't say spooky wooky but great content man, keep it up.

  • @rafaellisboa8493
    @rafaellisboa8493 ปีที่แล้ว

    I don't understand any of this but it was very cool to watch, want to learn some day

  • @Anon0nline
    @Anon0nline ปีที่แล้ว

    This seems like a lot of effort when it's really easy to write a script for both Windows and Unix-like systems that just creates a new elevated hidden account and a SSH session over tor.

  • @ValZarGaming
    @ValZarGaming ปีที่แล้ว +1

    If you typo a name in Notepad++ you can just right click the tab and click rename

  • @yeetoro3693
    @yeetoro3693 ปีที่แล้ว

    more of these please

  • @HackTheHackers
    @HackTheHackers ปีที่แล้ว

    awesome!

  • @iWhacko
    @iWhacko ปีที่แล้ว

    the garbled names could be a conversion error between file encodings, like between unicode and utf8

  • @refaiabdeen5943
    @refaiabdeen5943 ปีที่แล้ว

    Cheers Mate.

  • @broom7294
    @broom7294 ปีที่แล้ว +2

    FINALLY MALWARE ANALYSIS

  • @KataisTrash
    @KataisTrash ปีที่แล้ว

    I kind of love watching you try to figure out that regex :)) All you needed was just "'\[PHP](.*?)\]", with multi-line flag (to skip the newline stuff). Not sure about multi-line in sublime, but as far as I could google it's just (?s) in the front, so "(?s)'\[PHP](.*?)\]" should work?

  • @snabbisnabb595
    @snabbisnabb595 ปีที่แล้ว

    I love these deobfuscation vids, however, I would feel uneasy just to use your execute function. What if there still is some eval function within the thing you are executing? Isnt this quite risky?

  • @netanel135
    @netanel135 ปีที่แล้ว

    You are awesome 👌🏾

  • @MCorange9
    @MCorange9 ปีที่แล้ว +1

    Hey, quick question, where do you find these. The deobuscation looks fun but i cant seem to find good malware

  • @hihihi1733
    @hihihi1733 ปีที่แล้ว

    Awesome

  • @DouweHummeling
    @DouweHummeling ปีที่แล้ว

    This video is amazing, I love listening to you (20:01)

  • @Basieeee
    @Basieeee ปีที่แล้ว

    "This is gonna suck, you guys must hate listening to me."
    Me: 20 mins in already.

  • @custard131
    @custard131 ปีที่แล้ว

    you should try out the CTRL+D keyboard shortcut in sublime

  • @vaibhav3852
    @vaibhav3852 2 หลายเดือนก่อน

    I just saw the other video where this rat was found. After that I hit your malware playlist and saw this. I was so sad like you when I saw the comment at the top of the code. :D

  • @altaccount648
    @altaccount648 ปีที่แล้ว +2

    why use regex to remove the same lines 50 times when you can ctrl+d in vscode?

  • @seansingh4421
    @seansingh4421 8 หลายเดือนก่อน

    This is the reason I have extremely strict Applocker settings on any of my Windows desktop.

  • @sammyfromsydney
    @sammyfromsydney ปีที่แล้ว

    I'd be very wary of your neat little trick of overriding functions because if you get it even slightly wrong you're going to have a bad day. At least it was on a VM and disconnected from the Internet.

  • @SLZeroArrow
    @SLZeroArrow ปีที่แล้ว

    This must of been a freaking PAIN to do, like many many attempts to get it deobfuscated.
    Darn those hackers really challenged you here didn't they.

  • @peekadutchu4928
    @peekadutchu4928 ปีที่แล้ว

    Couldn't you check if it would run in the first place, despite all the errors, by adding the custom executeglobal to the first script, since it would be nerved?

  • @abrarmasumabir3809
    @abrarmasumabir3809 ปีที่แล้ว

    what chair are you using? It doesn't look like the old one.

  • @telmo49
    @telmo49 ปีที่แล้ว

    Jhon, best video EVER XD

  • @spiralsage
    @spiralsage 10 หลายเดือนก่อน

    Cool

  • @swamppifi6186
    @swamppifi6186 ปีที่แล้ว

    it might help if you do a condensed version without the false starts. but it is still a good video

  • @majinfoo
    @majinfoo ปีที่แล้ว +1

    You're so badass John

  • @KennethLongcrier
    @KennethLongcrier ปีที่แล้ว

    Won't Visual Studio Code run under RemNux? (VS Code should allow you to run VB/VBScript code)

  • @hotefects
    @hotefects ปีที่แล้ว

    Was that the one they sent you on twitter ?

  • @peterwestin1874
    @peterwestin1874 ปีที่แล้ว

    Probably got one more soon.

  • @nixielee
    @nixielee ปีที่แล้ว

    Deobfuscation videos are your best work. Apart from the excessive zooming. That drives me crazy.

  • @accountname1047
    @accountname1047 ปีที่แล้ว

    I still learned something about visual basic, don't feel bad

  • @SheIITear
    @SheIITear ปีที่แล้ว

    28:10, arent those services used keep the same address? like if your server or whatever ip changes that service automatically takes care of it and you dont have to update the payloads with the new ip

    • @DaxyGamer
      @DaxyGamer ปีที่แล้ว

      yes they say the ip is static not dynamic

  • @disdroid
    @disdroid ปีที่แล้ว

    I wouldn't bother finding a regex for less than about 8-10k lines, it would be quicker to delete in the editor

  • @collect0r
    @collect0r ปีที่แล้ว

    10 minutes in i worked out the obfuscation of ascii

  • @PhilXavierSierraJones
    @PhilXavierSierraJones ปีที่แล้ว

    "Damnit it was Dunihi again!"

  • @diddyman1958
    @diddyman1958 ปีที่แล้ว

    Don't be sorry for putting this video out, the fun was in the de-obfuscation

  • @corners1733
    @corners1733 ปีที่แล้ว

    cool

  • @SmallAngryNerd
    @SmallAngryNerd ปีที่แล้ว

    "This is garbage! this does nothing!" - the TA grading my freshman coding projects

  • @axjv
    @axjv ปีที่แล้ว

    Interesting breakdown.
    At 26:34 I think you have an extra )

  • @mattcargile
    @mattcargile ปีที่แล้ว

    Why wouldn’t the weird text in next.vbs data work?

  • @beyondcatastrophe_
    @beyondcatastrophe_ ปีที่แล้ว +2

    28:30 "Would this even execute?" Yes, it would, you are forgetting the first line "On Error Resume Next". This basically tells the interpreter to set the global "Err" and continue as if nothing had happened.

    • @mattcargile
      @mattcargile ปีที่แล้ว

      Do you know why we couldn’t get the next.vbs script to correctly display the data and how to override executeglobal?

    • @beyondcatastrophe_
      @beyondcatastrophe_ ปีที่แล้ว

      @@mattcargile I assume you mean the error at 22:45? I think this is because the syntax does not properly handle special characters. John just dumped the string as-is, instead of going through any serialization. Whereas when it is already in memory, that's not a problem. (E.g. quotes, in memory it's just a ", but if you want it inside a string, you need to do "").
      As for how to override executeglobal, I'm not sure what your question is. "Override" is a slightly ambiguous term in programming; you can see at 24:45 that he just re-defines the function to "catch" the call to the built-in and do something else.

  • @alex-dn9to
    @alex-dn9to ปีที่แล้ว

    wow they used a sphere 👌👌