Analyzing Real Malware in our DIY Sandbox | master0Fnone Episode 2.2: Sandbox in a Box

  Рет қаралды 1,117

jeFF0Falltrades

jeFF0Falltrades

Күн бұрын

Пікірлер: 37
@jeFF0Falltrades
@jeFF0Falltrades 5 ай бұрын
Hello! Welcome to the pinned comment for this video, and thanks for watching! Updates: 00:24:00: I followed-up on this thought and RAT King Parser now supports parsing XWorm configs! Check out my GitHub for more info.
@micha7863
@micha7863 5 ай бұрын
Once again, awesome job, thanks.
@jeFF0Falltrades
@jeFF0Falltrades 5 ай бұрын
@@micha7863 Thanks so much and thanks for being here 🙏
@Jarvx
@Jarvx 5 ай бұрын
The most amazing re channel on the whole youtube, still watching the series but just wanted to point that out :)
@jeFF0Falltrades
@jeFF0Falltrades 5 ай бұрын
@@Jarvx Stahppppp 🥰 Seriously thanks for watching and being here 🙏
@its_fzx5275
@its_fzx5275 5 ай бұрын
I really liked the first couple of episodes about the basics in this series perhaps could you make a video where your reverse engineer a game like gta vice city or any old game but tailored for beginers? i know you have the roller coster video but I think a more beginner friendly one would be better + the game is really old Thanks for taking the time to read the comment
@jeFF0Falltrades
@jeFF0Falltrades 5 ай бұрын
Yeah I think we’ll be due for another game-based video soon as many people (myself included) have so much fun with those, and they are great for learning the basics while keeping things fun. Thanks for the suggestion!
@wittingsun7856
@wittingsun7856 5 ай бұрын
Good job, it would be amazing a video with more advanced topics explained clearly (like manual unpacking, handling anti analysis techniques, obfuscation...) 👏🏻
@jeFF0Falltrades
@jeFF0Falltrades 5 ай бұрын
@@wittingsun7856 Great suggestion! I wanted to start with the basics, but I think a follow-up video with more advanced techniques is called for, too. I’ll add that to the list :-)
@wittingsun7856
@wittingsun7856 5 ай бұрын
@@jeFF0Falltrades I'm happy to hear this, it definitely can't miss 😎
@M3STERL3G3ND
@M3STERL3G3ND 5 ай бұрын
this is gold
@jeFF0Falltrades
@jeFF0Falltrades 5 ай бұрын
@@M3STERL3G3ND So glad you think so ❤️ Really appreciate you watching, and the kind words
@moshedo7975
@moshedo7975 4 ай бұрын
is there a chance to see the actual network in Burp? on the linux machine?
@jeFF0Falltrades
@jeFF0Falltrades 4 ай бұрын
@@moshedo7975 Do you mean is it possible to see network traffic using just Burp?
@moshedo7975
@moshedo7975 4 ай бұрын
@@jeFF0Falltrades im asking in case that I followed your configuration in this vid is there a chance to see actual decrypted HTTPS traffic in burp?
@jeFF0Falltrades
@jeFF0Falltrades 4 ай бұрын
@@moshedo7975 If you follow the configuration in the video, then you will be able to see HTTPS traffic in Burp, yes! You would see the same traffic - and more than HTTPS - logged in INetSim as that’s our primary network logging on the Remnux box. You could intercept traffic in Burp as well, but you would have to configure multiple proxies and also keep INetSim or some other service running to forward the requests to. EDIT: The traffic would be in Burp under Proxy->HTTP History by the way
@moshedo7975
@moshedo7975 4 ай бұрын
@@jeFF0Falltrades So I messed up somehow because I don't see that
@jeFF0Falltrades
@jeFF0Falltrades 4 ай бұрын
@@moshedo7975 Okay, we can troubleshoot: Are you able to do a simple ping from your Windows VM to your Remnux VM? If so, can you pull a web page on the Windows VM while INetSim runs on your Remnux VM?
@xiaonguyen6693
@xiaonguyen6693 5 ай бұрын
wont running e.g. procmon or ida be detected by a lot of malware?
@jeFF0Falltrades
@jeFF0Falltrades 5 ай бұрын
@@xiaonguyen6693 Great question! Some families might have “stoplists” of processes they might monitor for and stop working if they detect them running written into the malware program, as an anti-sandbox measure. But it’s very easy to bypass this as the analyst: In fact, there’s a blog post on Medium by Mohammed Dief that’s a good example of this where he just changes a few attributes of the procmon executable to bypass a video game (of all things) program that checks for procmon as an anti-debug measure. So what I would say is: If it looks like a piece of malware is not running fully or you’re not getting results you expect, either throw it in a debugger like we do with Royal ransomware here to find out more OR, more simply, just experiment with your monitoring tools to see if closing one of them changes the behavior of the malware. That’s the benefit of using a hands-on lab, vs. a fully automated one. Thanks and good thinking!
@ihacksi
@ihacksi 4 ай бұрын
Hi Good job on the challenge man! I finished the last questions but the first ones are still empty. Crackme only uses kernel32.dll and it doesn't import any dll out of system32 while running, any hints ?
@jeFF0Falltrades
@jeFF0Falltrades 4 ай бұрын
@@ihacksi Hint: Don’t just look for static imports - look for things loaded dynamically. One of the tools in this video might provide a shortcut 😉 Great work! Get your name on that wall! Come on back if you get stuck, but I think you’ll get it.
@ihacksi
@ihacksi 4 ай бұрын
@@jeFF0Falltrades Question 2-3 still remains, went and tried all the dlls imported in runtime but no luck. Is the crackme doing something different in your environment? I tried with network/no network and procmon output only reveals two file activities you asked in the later questions.
@jeFF0Falltrades
@jeFF0Falltrades 4 ай бұрын
@@ihacksi I will say this: The crackme executable does NOT adhere to the typical DLL loading you see in C/C++ binaries...so if you are looking at typical calls to APIs that you're used to seeing when looking for loaded DLLs, you probably won't turn up much in this particular case. But there is a DLL there. Perhaps something else could help in finding it.
@ihacksi
@ihacksi 4 ай бұрын
@@jeFF0Falltrades Thanks, I found the dll using the tool mentioned on video. So procmon only lists the known dlls called from the disk/system then? In memory executions are stealthy.
@jeFF0Falltrades
@jeFF0Falltrades 4 ай бұрын
@@ihacksi I believe it’s because procmon monitors for the same few calls to known system DLLs (LoadLibrary, GetProcAddress, etc.) to monitor for DLL activity, whereas this binary uses a different implementation to load the DLL into memory, so it flies under the radar of many tools. Great work! I see your name on the wall now!!!
@lukefidalgo8154
@lukefidalgo8154 5 ай бұрын
just did the crackme, and it looks like the last question in the google forms is broken? I definitely did math right but google forms won't accept the any answer
@jeFF0Falltrades
@jeFF0Falltrades 5 ай бұрын
You are absolutely correct - thanks for reporting this! It was a validation typo. Good news is 1) It's fixed now and 2) This must mean you are among the first to get the crackme completed!
@jeFF0Falltrades
@jeFF0Falltrades 5 ай бұрын
There it is! Congratulations and well done!!!
@lukefidalgo8154
@lukefidalgo8154 5 ай бұрын
@@jeFF0Falltrades thank you! It was really fun solving the challenges!
@jeFF0Falltrades
@jeFF0Falltrades 5 ай бұрын
@@lukefidalgo8154 Glad to hear it! I'm always nervous leading up to a release b/c I have a lot of fun making them and testing them out, and there's always the "Ah damn, is this going to be something that's just fun for *me*?" X-D So glad you enjoyed!
1% vs 100% #beatbox #tiktok
01:10
BeatboxJCOP
Рет қаралды 67 МЛН
人是不能做到吗?#火影忍者 #家人  #佐助
00:20
火影忍者一家
Рет қаралды 20 МЛН
REAL or FAKE? #beatbox #tiktok
01:03
BeatboxJCOP
Рет қаралды 18 МЛН
I Made an Electronic Chessboard Without Turns
14:32
From Scratch
Рет қаралды 1 МЛН
The ULTIMATE Raspberry Pi 5 NAS
32:14
Jeff Geerling
Рет қаралды 2,5 МЛН
Coding The Rat King: A Multi-Family Malware Configuration Parser
1:43:38
Hacking An Obscure Game From 2000 To Run On Windows 11
16:22
Nathan Baggs
Рет қаралды 106 М.
1% vs 100% #beatbox #tiktok
01:10
BeatboxJCOP
Рет қаралды 67 МЛН