Dynamic Malware Analysis

แชร์
ฝัง
  • เผยแพร่เมื่อ 28 พ.ย. 2024

ความคิดเห็น • 32

  • @idkk403
    @idkk403 8 หลายเดือนก่อน +6

    You have no idea, how much you have helped me!!! Thankyouuuu

  • @chieduodo1292
    @chieduodo1292 2 ปีที่แล้ว +12

    Great walk-through. Lots of helpful tips. The reason Regshot did not catch file activity was because the checkbox option was not selected before your first shot. And for the HTTP traffic missing, that might be because Wireshark could not decrypt HTTPS traffic. I believe you would have seen something if you tried using fiddler as well. Thanks!

    • @mertkacir9981
      @mertkacir9981 ปีที่แล้ว +1

      you mean scan dir1 checkbox ? but in website they didn't check it either.

  • @tommypham1101
    @tommypham1101 5 หลายเดือนก่อน

    awesome content thank you

  • @Manish-g2k3g
    @Manish-g2k3g 7 หลายเดือนก่อน

    Brilliant 😇

  • @mohdsuhailmalik3033
    @mohdsuhailmalik3033 8 หลายเดือนก่อน

    thanks for the video

  • @bulba888
    @bulba888 6 หลายเดือนก่อน

    Working on that chapter at Letsdefend SOC analysis path

  • @RINAMISHRA-j5h
    @RINAMISHRA-j5h ปีที่แล้ว

    Very Informative Video Sir, I just wanted to know how you decide to run the malware for a particular amount of time. How you stopped malware to execute itself.

  • @lyquockhanhly6319
    @lyquockhanhly6319 3 หลายเดือนก่อน

    Good

  • @MarcosPinheiro-cy3oo
    @MarcosPinheiro-cy3oo หลายเดือนก่อน

    I would have liked to see the network settings so that the malware analysis could be done safely. I know the network adapter should be in host-only mode, but wouldn't that leave the VM without internet? Should I enable two network adapters? One in NAT and the other in host-only?

    • @sebastianschirm1211
      @sebastianschirm1211 26 วันที่ผ่านมา

      You will have to keep switching between both network interface as you progress with the analysis.Once you need internet switch to NAT and immediately switch back to Host only once done to avoid any issues

  • @Ahmed_Hossamm
    @Ahmed_Hossamm หลายเดือนก่อน

    thank you so much man!

  • @Ttyumbra
    @Ttyumbra ปีที่แล้ว

    How do you download the tools used for the malware analysis section ?

  • @IlyasNashid
    @IlyasNashid 9 หลายเดือนก่อน

    Thank you so much this made things so much more clear to me if you have your own channel id love to follow thank you again

  • @puucca
    @puucca ปีที่แล้ว +1

    Zaid is so fucking fun bro i cant

  • @MongiNTS3YT
    @MongiNTS3YT 26 วันที่ผ่านมา

    Im scared to have my malware analysis machine in Bridged mode to do proper Dynamic Analysis cos i fear anything propegating to my host or any other device on our network

    • @sebastianschirm1211
      @sebastianschirm1211 26 วันที่ผ่านมา +1

      Do not use bridged mode instead use Host only mode if you don’t need the internet but if you do switch to NAT

  • @baskaranranujan7234
    @baskaranranujan7234 ปีที่แล้ว +1

    How can we download malware samples as shown in the clip ?

  • @hamzafeghouli4297
    @hamzafeghouli4297 ปีที่แล้ว +1

    is there anyway to automate this whole analysis ?

    • @Pl4s_m4
      @Pl4s_m4 ปีที่แล้ว +2

      If you find a way, let me know too?

    • @hamzafeghouli4297
      @hamzafeghouli4297 ปีที่แล้ว

      @@Pl4s_m4 check for Morrigu by Phil Leg, basically he compares the behaviour of evasive malwares before and after modifying the VM using a tool he created, maybe this will help you

  • @martabakselatan2
    @martabakselatan2 หลายเดือนก่อน

    the quality part compare regshot so bad, is that editing

  • @amigazo3972
    @amigazo3972 6 หลายเดือนก่อน +2

    The module is to create your own malware analysis virtual machine. NO malware files to download, not copy of your notes to download. Anything available. The course itself is just a mess. Very disappointed about this module. Your explanation is very good, but without the resources seen in these videos... not a good thing.

  • @elchirete
    @elchirete 8 หลายเดือนก่อน

    On 11:05 you can see the name of the file that you are looking for inside %TEMP% tmp565A.tmp

  • @yuvarajnaresh3934
    @yuvarajnaresh3934 7 หลายเดือนก่อน +5

    c:\users\letsdefend\appdata
    oaming\vbxfiqycyfdggl.exe -->This is the answer

  • @BDCAT_NgoQuangTung
    @BDCAT_NgoQuangTung ปีที่แล้ว +2

    How can we download malware samples as shown in the clip ?