Dynamic Malware Analysis

แชร์
ฝัง
  • เผยแพร่เมื่อ 3 ม.ค. 2025

ความคิดเห็น • 33

  • @idkk403
    @idkk403 9 หลายเดือนก่อน +6

    You have no idea, how much you have helped me!!! Thankyouuuu

  • @chieduodo1292
    @chieduodo1292 2 ปีที่แล้ว +12

    Great walk-through. Lots of helpful tips. The reason Regshot did not catch file activity was because the checkbox option was not selected before your first shot. And for the HTTP traffic missing, that might be because Wireshark could not decrypt HTTPS traffic. I believe you would have seen something if you tried using fiddler as well. Thanks!

    • @mertkacir9981
      @mertkacir9981 ปีที่แล้ว +1

      you mean scan dir1 checkbox ? but in website they didn't check it either.

  • @mohdsuhailmalik3033
    @mohdsuhailmalik3033 9 หลายเดือนก่อน

    thanks for the video

  • @bulba888
    @bulba888 7 หลายเดือนก่อน

    Working on that chapter at Letsdefend SOC analysis path

  • @IlyasNashid
    @IlyasNashid 11 หลายเดือนก่อน

    Thank you so much this made things so much more clear to me if you have your own channel id love to follow thank you again

  • @tommypham1101
    @tommypham1101 6 หลายเดือนก่อน

    awesome content thank you

  • @lyquockhanhly6319
    @lyquockhanhly6319 4 หลายเดือนก่อน

    Good

  • @Ahmed_Hossamm
    @Ahmed_Hossamm 3 หลายเดือนก่อน

    thank you so much man!

  • @Manish-g2k3g
    @Manish-g2k3g 8 หลายเดือนก่อน

    Brilliant 😇

  • @RINAMISHRA-j5h
    @RINAMISHRA-j5h ปีที่แล้ว

    Very Informative Video Sir, I just wanted to know how you decide to run the malware for a particular amount of time. How you stopped malware to execute itself.

  • @puucca
    @puucca ปีที่แล้ว +1

    Zaid is so fucking fun bro i cant

  • @MarcosPinheiro-cy3oo
    @MarcosPinheiro-cy3oo 2 หลายเดือนก่อน

    I would have liked to see the network settings so that the malware analysis could be done safely. I know the network adapter should be in host-only mode, but wouldn't that leave the VM without internet? Should I enable two network adapters? One in NAT and the other in host-only?

    • @sebastianschirm1211
      @sebastianschirm1211 2 หลายเดือนก่อน

      You will have to keep switching between both network interface as you progress with the analysis.Once you need internet switch to NAT and immediately switch back to Host only once done to avoid any issues

  • @Gurd-f2z
    @Gurd-f2z ปีที่แล้ว

    How do you download the tools used for the malware analysis section ?

  • @baskaranranujan7234
    @baskaranranujan7234 ปีที่แล้ว +1

    How can we download malware samples as shown in the clip ?

  • @hamzafeghouli4297
    @hamzafeghouli4297 ปีที่แล้ว +1

    is there anyway to automate this whole analysis ?

    • @Pl4s_m4
      @Pl4s_m4 ปีที่แล้ว +2

      If you find a way, let me know too?

    • @hamzafeghouli4297
      @hamzafeghouli4297 ปีที่แล้ว

      @@Pl4s_m4 check for Morrigu by Phil Leg, basically he compares the behaviour of evasive malwares before and after modifying the VM using a tool he created, maybe this will help you

  • @MongiNTS3YT
    @MongiNTS3YT 2 หลายเดือนก่อน

    Im scared to have my malware analysis machine in Bridged mode to do proper Dynamic Analysis cos i fear anything propegating to my host or any other device on our network

    • @sebastianschirm1211
      @sebastianschirm1211 2 หลายเดือนก่อน +1

      Do not use bridged mode instead use Host only mode if you don’t need the internet but if you do switch to NAT

  • @martabakselatan2
    @martabakselatan2 2 หลายเดือนก่อน

    the quality part compare regshot so bad, is that editing

  • @amigazo3972
    @amigazo3972 7 หลายเดือนก่อน +2

    The module is to create your own malware analysis virtual machine. NO malware files to download, not copy of your notes to download. Anything available. The course itself is just a mess. Very disappointed about this module. Your explanation is very good, but without the resources seen in these videos... not a good thing.

    • @s2grabbarna806
      @s2grabbarna806 27 วันที่ผ่านมา

      It’s a good module. It isnt really that hard to import the malware file from the internet by yourself…

  • @elchirete
    @elchirete 9 หลายเดือนก่อน

    On 11:05 you can see the name of the file that you are looking for inside %TEMP% tmp565A.tmp

  • @yuvarajnaresh3934
    @yuvarajnaresh3934 8 หลายเดือนก่อน +7

    c:\users\letsdefend\appdata
    oaming\vbxfiqycyfdggl.exe -->This is the answer

  • @BDCAT_NgoQuangTung
    @BDCAT_NgoQuangTung ปีที่แล้ว +2

    How can we download malware samples as shown in the clip ?