PowerShell CRYPTOSTEALER through DNS
ฝัง
- เผยแพร่เมื่อ 28 ก.ย. 2024
- j-h.io/snyk || Try Snyk to find vulnerabilities in your own code and applications FOR FREE ➡ j-h.io/snyk
🔥 TH-cam ALGORITHM ➡ Like, Comment, & Subscribe!
🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
John, you are an amazing Fella who always makes AAA+ quality videos! Huge props to you!! 😊
I really have obtained lots of knowledge from your videos!
Powershell is so cool, you never have to worry about installation. Makes it easier
yeah, I've never had much disposal to deep learn ps but it's really cool
How did you get to stage 2? Did I miss something? These ps1 scripts are just reading from registry and getting values. What values are they getting?
So after the first stage ran, it output a base64 code. He decode it and it shows a block of code. That code is the second stage.
Stop fast forwarding through the video and you won't have to come to the comments to ask dumb questions.
@@BryanLu0 I see, thank you kind sir.
Do you ever go live??
Thanks man!!
thanks
love your videos sir
3:23 Shouldn't that have been, "to be able to be *run*?"
Good stuff here.. thanks
What editor is that please
sublime text bro
Why they store payloads as byte arrays?
Most likely harder to detect since it needs to be put back together
great
nice
More videos also following master
Mind-blowing how these files brutally murder PowerShell. Even if you think about creating a file that doesn't make sense, to help disguise the malware, these scripts are terrible.
huh?
He tripped?
I think he meant that the person who wrote the powershell script did a really poor obfuscation job
Codo details (echo Iymjmjimy) creation of the code different
Omg i was like 1000 🥹 thank you, John. Amazing content as usual
So experience tools and codo nt mes tycopo mistake never to give up open tool hydel.
Lol holy 20 secs early
18:35 That looks like someone actually modified the malicious DNS record instead of just removing it XD
yes, exactly
Already stopped the same attack thanks for this. Also did the malware analysis of the .ps1 file.
That UUID at the top of the script in the registry is probably to change the signature of the script.
How are they injecting and running the PowerShell? It feels like we’re missing the initial attack.
Phishing or adware would be my initial thoughts.
Temp files/adware/malware. Unprotect your computer and visit as many fishy websites as you can. Then turn on your protection and watch it pick up a bunch of stuff in your temp folder.
Ingress/egress by DNS is so brutally annoying!
coolbase64 package for sublime would be useful for this kind of stuff since you do a lot of decoding ,you can just select and decode in sublime directly
For a moment there I thought scambot (EDIT: now banned and deleted) was doing a ^this style comment to reaffirm your suggestion.
Which very well may be the first and only actually useful thing it did.
Love these videos 😎!!
uuh, wtf. I found this on a pc two weeks ago, 3 PowerShell files with a name of 4 random characters with the exact same contents. I correctly identified it as a virus and did some research, after deleting it there still remained some other parts which I could not find (I am a noob on this), so wiped everything. Amazing to see a video on it
I did think of sending it to you, just to see. But did not do it in the end, idk why
Love this content! Thank you for the analysis as always ❤️
The guys that saved everyone from becoming victims. GG
I had this too and not sure where I had gotten it.
Powershell stuff is interesting af
Sho talented person.
translation master and brother.
13:01 and I'm here for it
This is so crazy 😂
One 🕐 login all
Great master
aaawesome !!!
😅
Wat
Great video! Almost went into the rabbit hole together with you :D
yeah right
One more reason to analyze DNS traffic
how to? any software or tips?
@@scrpiona Suricata + Elastic Security with Machine Learning module. Easiest, but needs ML license. Still few orders of magnitude more accessible, than some popular solutions
What is crypto jacker
It's JM
@@thomas-wiki JM ?
@@animeworld4775 Joe Mama
They tell me to keep comment on your video to get more subs.
so, am I need auto comment bot or something? 🤔
I am in sri lanka. Fifteenth yeah old.
You will one day be very powerful
Nice!
Yeah!
Grape! You will be good.
Second view including him!!!
bro i m overwhelmed what programming languages do i need for cybersecurity?
what are you attacking?
@djr thanks man appreciate it also what can i do with java?
third