Analyzing Ransomware - Dumping a CryptoAPI Keygen

  Рет қаралды 3,495

Michael Gillespie

Michael Gillespie

Күн бұрын

In this video, we will reverse a ransomware's keygen that uses the Microsoft CryptoAPI and dump the keys from memory.
Sample: www.hybrid-ana...
VirtualBox: www.virtualbox...
PEStudio: www.winitor.com/
IDA Free: www.hex-rays.com/
x64dbg: x64dbg.com/
HxD: mh-nexus.de/en...
More information on the ransomware analyzed: / 1002209455646429186

Пікірлер: 25
@yakovgoldberg7108
@yakovgoldberg7108 6 жыл бұрын
You rock! Thank you for sharing these awesome videos with us.
@present5343
@present5343 6 жыл бұрын
Dude you make it seems so easy! Good job
@beeb490
@beeb490 3 жыл бұрын
you are more than awesome maaaaaaaaaaan
@Iamrkapoor
@Iamrkapoor 3 жыл бұрын
Hi Michael, Thank you for sharing this. I have 2 questions here. 1. So, we could extract the plaintext session key because the cryptexportkey() wasn't using hExpkey (that is using the public key/rsa key to encrypt the session key while exporting) ? 2. Also, in my lab, the malware doesn't create decode.key under windows folder when I step through Createfile(). Any points what could be wrong ?
@hackfans8143
@hackfans8143 2 жыл бұрын
Awesome tutorial, but how can I dowload the sample without registering
@karthikeyankumar4078
@karthikeyankumar4078 2 жыл бұрын
Hi, My xdbg32 not creating decode.txt file in my c windows folder after CreateFileA api, not even encrypting the machine. Anything i needed to be done before
@bobo-px5gy
@bobo-px5gy 5 ай бұрын
maybe it's about debbugging issues that has already done, or you're using a diff os version !
@sirreggiereginald2542
@sirreggiereginald2542 5 жыл бұрын
Question for you, since the unencrypted AES key was in memory, would performing memory forensics after the malware is executed possibly lead to key recovery?
@Demonslay335
@Demonslay335 5 жыл бұрын
Theoretically, yes, assuming it wasn't properly zero'd from memory. Never had experience with that working personally once the executable has exited and the memory overwritten by another process.
@jovensotto7701
@jovensotto7701 5 жыл бұрын
Dear Michael, I need ur advise, I was infected by a Virus name: Nemty & Kvag at the same File, pls do help me,.
@Demonslay335
@Demonslay335 5 жыл бұрын
Nemty, contact Tesorion CISRT. For Kvag, aka STOP Djvu, read the BleepingComputer support topic FAQ.
@nathanuchoa9130
@nathanuchoa9130 6 жыл бұрын
Hello, Michael! How to get Crypto Tester? sorry my english I'm learning, hugs from Brazil.
@Demonslay335
@Demonslay335 6 жыл бұрын
I haven't published it yet - it's a tool suite I wrote. I'll make a video highlighting it when it's released. 😉
@nathanuchoa9130
@nathanuchoa9130 6 жыл бұрын
@@Demonslay335 thanks, very nice video friend
@theshiv303
@theshiv303 6 жыл бұрын
heh dude, he said sex 3:57
@rpsingh7558
@rpsingh7558 4 жыл бұрын
with your knowledge one day you will break RSA encryption and ransomware
@Demonslay335
@Demonslay335 4 жыл бұрын
That's not how it works... RSA-1024 and above will only be breakable using a quantum computer that is leagues above what's available right now. We're a good 20-30+ years from such a thing.
@rpsingh7558
@rpsingh7558 4 жыл бұрын
@@Demonslay335 i know sir, but i wish someday it happen
@rpsingh7558
@rpsingh7558 4 жыл бұрын
i had a txt file in windows folder written public key inside , is it helpful?
@Demonslay335
@Demonslay335 4 жыл бұрын
@@rpsingh7558 If it's RSA-1024 or above, no. It's called the RSA factoring problem.
@rpsingh7558
@rpsingh7558 4 жыл бұрын
@@Demonslay335 thanks but how i know its 1024 or 2096 etc
Analyzing Ransomware - Reversing AutoIT Ransomware
15:19
Michael Gillespie
Рет қаралды 3,5 М.
Analyzing Ransomware - Completing a FULL Analysis
48:23
Michael Gillespie
Рет қаралды 11 М.
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 19 МЛН
We Attempted The Impossible 😱
00:54
Topper Guild
Рет қаралды 56 МЛН
Сестра обхитрила!
00:17
Victoria Portfolio
Рет қаралды 958 М.
Analyzing Ransomware - Reversing a CryptoAPI Decrypter
38:25
Michael Gillespie
Рет қаралды 4,6 М.
Analyzing Ransomware -  .NET Ransomware with a C2 Server
33:44
Michael Gillespie
Рет қаралды 1,1 М.
AI Is Making You An Illiterate Programmer
27:22
ThePrimeTime
Рет қаралды 300 М.
Analyzing Ransomware - Using CryptoTester
13:34
Michael Gillespie
Рет қаралды 2,9 М.
Analyzing Ransomware - Recreating an LCG Keygen
23:27
Michael Gillespie
Рет қаралды 1 М.
What P vs NP is actually about
17:58
Polylog
Рет қаралды 149 М.
I Reverse Engineered this Program and Generated Infinite CD Keys
11:39
Finding hard to find offsets with IDA PRO
12:03
A
Рет қаралды 18 М.
Analyzing Ransomware - Decrypting RC4 Config
16:44
Michael Gillespie
Рет қаралды 4 М.
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 19 МЛН