Malware Analysis #1 - Hacked Channel Distributes Redline Stealer!

แชร์
ฝัง
  • เผยแพร่เมื่อ 18 ธ.ค. 2024

ความคิดเห็น • 13

  • @trieshah
    @trieshah 4 หลายเดือนก่อน +9

    not a clue whats going on but this just got posted bros going somewhere 100%

  • @alladin7769
    @alladin7769 4 หลายเดือนก่อน +1

    Awesome video! You really broke down how the Redline Stealer works in a way that makes sense. It's wild to see how these hacks happen. Can't wait to see what you dive into next!

  • @prodKossi
    @prodKossi 4 หลายเดือนก่อน +3

    Really interesting - I couldn't follow 100%, as I'm fairly new to de-obfuscating, but it's really cool to get a glimpse of an actual workflow! Keep uploading videos like these man 💜

    • @RyanWeil-r1n
      @RyanWeil-r1n  4 หลายเดือนก่อน +2

      Thanks for the kind words. I didn't do too much regarding deobfuscation in this video other than using the de4dot fork I specified in the description to deobfuscate both of the stage one files. If you are interested in learning how to write your own (relatively) basic de4dot deobfuscator, I have an article about that on my GitHub site: ryan-weil.github.io/posts/AGENT-TESLA-2/

  • @sebastianfischer429
    @sebastianfischer429 4 หลายเดือนก่อน +3

    I almost feel honoured to have been recommended this video. 8 views and a channel created today.
    Maybe this is because the type of video is quite similar to those of Eric Parker, who I watch a lot, although your video appears lot more in depth. Very interesting, but due to lack of the technological knowledge, I could not understand a lot.
    Let's see if the algorithm blesses you with more recommendations. 😊

  • @godlike4423
    @godlike4423 4 หลายเดือนก่อน +2

    Very nice vid, that's the recommendations I love.

  • @lekicohen8724
    @lekicohen8724 4 หลายเดือนก่อน +2

    Hey I’m watching but am very confused love it tho :)

  • @wittingsun7856
    @wittingsun7856 4 หลายเดือนก่อน

    Can you do some hard ransomware?

    • @RyanWeil-r1n
      @RyanWeil-r1n  4 หลายเดือนก่อน

      Any particular one you have in mind?

    • @wittingsun7856
      @wittingsun7856 4 หลายเดือนก่อน +1

      @@RyanWeil-r1n maybe noescape, hunters and kasseika, what do you think?

    • @RyanWeil-r1n
      @RyanWeil-r1n  4 หลายเดือนก่อน

      @@wittingsun7856 Kasseika looks cool because it uses BYOVD. May be worth looking at when I have more time. Otherwise, I am not interested in ransomware at all in terms of its encryption scheme, etc. so I'd probably just analyze the attack chain itself! Also, from what I've heard the ransomware payload is virtualized with Themida, so even if I wanted to do some static analysis on it I'd stand no chance against that haha (and I find dynamic analysis boring).

  • @slametwidi1544
    @slametwidi1544 2 หลายเดือนก่อน

    hallo can i get your contact?