MALWARE ANALYSIS | Reversing IDAT (Hijack) Loader / Injector using x32dbg, Ghidra, and IDA

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ม.ค. 2025

ความคิดเห็น •

  • @chathurangaonnet
    @chathurangaonnet 8 หลายเดือนก่อน

    Literally I feel lost. Don't understand anything ! but keep trying watch this again and again. I like it. Also Love your memes they are so cool and as always ♥

  • @ownagesbot54
    @ownagesbot54 3 หลายเดือนก่อน

    @ 12:00 is it just me or does this shellcode look like ScyllaHide's code?

    • @cyberraiju
      @cyberraiju  3 หลายเดือนก่อน

      Yeah you're correct. I previously updated the video description to mention my oversight there.
      "Note: In the video I call out a section at 11:14 around the string 'malware called ResumeThread' this is actually part of the Hooked functions library of ScyllaHide an anti-anti-debug library and not the malware itself. This is an oversight on my behalf."

    • @ownagesbot54
      @ownagesbot54 2 หลายเดือนก่อน

      @@cyberraiju Sorry, hadn't noticed that, and wasn't a criticism - I'm working on something similar and had found the same shell code/strings and wanted some confirmation that I was understanding things correctly.
      Thank you for your videos, been very helpful to me.

    • @cyberraiju
      @cyberraiju  2 หลายเดือนก่อน

      @ownagesbot54 ahh no worries at all, apologies if my previous comment came across blunt 😌
      Thanks for the kind words! Super glad they have been helpful, and wishing you the best with your analysis 🙏

  • @hectormorenocampo
    @hectormorenocampo 8 หลายเดือนก่อน

    awesome!