The CS equivalent of a cold crime investigator, if it's old malware you can be an archaeologist lol AND ALL FROM HOME.
@solemngravisyre3 жыл бұрын
Amen
@julesl69103 жыл бұрын
Yep. The seed is sown, other pros will follow suit in time. John has started new forms of ASMR - malware unpeeling and relaxing haxing
@droopylikesyourface2 жыл бұрын
Bruh same , i cant pass a day without watching a video like this
@donovanelliott90602 жыл бұрын
Same
@AngryAxew3 жыл бұрын
Hacker mission: find as many ways as possible to sneakily hide IEX
@Clane2672 жыл бұрын
True Lol
@bhagyalakshmi1053 Жыл бұрын
Hack files 7zip files cery .
@Jacob-ABCXYZ Жыл бұрын
Gotta catch em all
@JonGarrett0013 жыл бұрын
That was very interesting. I really enjoyed watching you take this whole thing apart. It never ceases to amaze just how far malware creators go to conceal and drop their payloads into people's machines.
@Konym3 жыл бұрын
Don't mind me, just sharing the absolute love for these malware analysis videos.
@foxdk3 жыл бұрын
I'm so excited for this. After watching your first Malware analysis I was HOOKED! I've watched all 4-5 videos multiple times. It's gotten to the point where I can recite your words exactly. It's so exciting watching you go through the code, peeling back layers, and going off on a tangent trying to look something up. Seriously John, I'm addicted at this point. I kinda wish I would've stumbled upon your channels 5 years from now, because then there would've been a catalogue to fill my desires. Oh well, at least I can add this video to my repeat cycles, and watch it 10 times over, just like the other ones.
@DyslexicFucker3 жыл бұрын
Then recite them
@oneeyew1lly3 жыл бұрын
Recite it then
@kabalibabo3 жыл бұрын
Sounds a bit sketch ngl
@tear7283 жыл бұрын
@@kabalibabo lol right
@XxZigonxX2 жыл бұрын
that's quite the fervor for some videos about malware analysis. Its really got your attention, eh?
@LeetKrew0903 жыл бұрын
Man.. idk how got to view this channel, but now it's on my Top-Tier list channels to watch, quite addicting :D
@jkobain3 жыл бұрын
I concur.
@bbowling49793 жыл бұрын
I'm sure you already know this, but 128 bytes is the length of a digital signature for a 1024 bit modulus. Converting those 128 bytes (+1 for padding) using base64 encoding gives you 172 characters. Also 0x010001 is a commonly used exponent for RSA parameter sets.
@mossdem3 жыл бұрын
These videos are incredible. Loved seeing another one being premiered today! Keep up the good work Hohn Jammond
@mossdem3 жыл бұрын
@@lsh_ 😂 I know i was joking lol
@AGPMandavel Жыл бұрын
@@lsh_ Jesus learn what a joke is
@criticalposts31433 жыл бұрын
I have been waiting for more malware analysis in my life..
@vanessabakeryrecommendedha82923 жыл бұрын
Thank you hackermendax On telegram for saving me, i’m really grateful and will continue to tell my family and friends about you
@criticalposts31433 жыл бұрын
@@vanessabakeryrecommendedha8292 I can only assume this random message about "thank you [username] on telegram you saved me" is spam.
@vanessabakeryrecommendedha82923 жыл бұрын
@@criticalposts3143 nah bro try and see
@criticalposts31433 жыл бұрын
@@vanessabakeryrecommendedha8292 why tho. why. this is the most suspicious random message of all time. give me a good reason.
@criticalposts31433 жыл бұрын
@@vanessabakeryrecommendedha8292 I mean ffs you have a bitcoin as an avatar. if, like you, I enjoyed gambling money on useless things I would bet that this is either a straight up bitcoin scam or a dodgy, possibly illegal pump n dump operation
@criticalposts31433 жыл бұрын
judging by the amount of spam in this comment section I'd hazard a guess and say that you're been hit by, you've been struck by, an automated system that goes only off title keywords
@miallo3 жыл бұрын
If you want to replace single letter variables, you can use the word-boundaries from regex: \< (start of a word) and \> (end of a word). So you should be able to replace $d\> with $data
@ivanboiko89753 жыл бұрын
Hello John! I actually learned something new for myself, so thank you :) This video has helped me a lot!
@TiltIndeed3 жыл бұрын
I've been absolutely devouring your videos over the past weeks. Keep them coming!
@CybrJames3 жыл бұрын
John, my friend. 7:30am, I'm still dreaming that I am Chris Hemsworth. So early lol.
@okolol3 жыл бұрын
20:20 I guess john never heard of "soft wrap" or "word wrap"😂
@nikolas87413 жыл бұрын
Sure he does is just suspense
@СергейФёдоров-щ8ш3 жыл бұрын
also, never heard of "can't resolve hostname"
@okuno543 жыл бұрын
I just keep it off when I'm coding; it's not helpful except for natural language text
@adamgibson71812 жыл бұрын
I watched every second of this and have literally no idea what is happening. good stuff!
@melasonos6132 Жыл бұрын
this is your best video imo, so funny, and informative.
@dedkeny3 жыл бұрын
you know it's super cheezy to have that cmatrix background for your website when it contains no useful data
@DanielWoldeHawariat3 жыл бұрын
came across this video while researching Lemon Duck, a Great breakdown and walkthrough. Can you recommend any solutions on how to remove the malware from an infected machine?
@0x8badf00d3 жыл бұрын
5:30 If you're going to do that rather than just deleting all backticks, maybe use `([^abnt"']) instead of `(.)
@jackrendor3 жыл бұрын
Thank you a lot John Hammond. I always learn something new in your videos and I really appreciate your content! Hope to see more of this powershell obfuscation!
@navibongo9354 Жыл бұрын
Loved the breakdown, thx for the tasty recepty John!
@persona2grata Жыл бұрын
This is a fantastic video. Well done, sir.
@soundscrispy3 жыл бұрын
Love watching these on my way into work ☺️
@cry-wr4wt3 жыл бұрын
I dont have a pc and pretty much no backround in IT stuff but i really enjoy watching this
@julesl69103 жыл бұрын
If you make the effort to learn how to install Linux, you'll be hacking code in no time
@Scarter633 жыл бұрын
Between these unpeeling videos, and your deep dive into the dark web, this is more fun than watching Mr. Robot.
@LouisSerieusement3 жыл бұрын
I love all the malware analysis video so much ! thanks !
@ericm85023 жыл бұрын
These videos are awesome, keep up the great work!!!
@Ookami8raven3 жыл бұрын
Great Video! I love it!!! keep it up.
@flleaf3 жыл бұрын
11:14 he checked date on hand watches even though he he has it in the top right corner on screen
@flightless84022 жыл бұрын
Sadly everyone is so much smarer at computers, BUT! I feel at home in analysis, because John Hammond is my go to with my morning coffee.🌻
@samsevennine67423 жыл бұрын
Always Enjoy Your Vids
@nordgaren23583 жыл бұрын
John "I could just replace this with nothing, but I'd rather do some fancy RegEx expression" Hammond. Rolls off the tongue!
@darkfusion92153 жыл бұрын
Can u give me a guide step by step about reverse engineering. like i want to enter in malware analysis and cracking software so where i should start beginning to advance
@TheRogueBro3 жыл бұрын
The whole reason this script looks at the graphics card (and hash rates) are because if those exist, it wants to use them. You can generate more hashes (earn more money) with a graphics card vs a cpu. Not sure if you pick up on this later, only 41min in lol.
@mcgiwer3 жыл бұрын
Please configure your sublime that it automatically wrap the text. It would be easier for the viewers
@alexanderastardjiev97283 жыл бұрын
Hi John I really enjoy your videos. You are awesome! Am really hoping you are using somekind of the proxy when checking if the malicious domain is still up. You can hide your IP in the video, but you cannot hide it from the server owner logs...
@ApexFPS3 жыл бұрын
Love how you break these down
@RumenRad3 жыл бұрын
just a advice. Start the malware at the end of the video to see what's going on :)
@fu8863 жыл бұрын
39:19 43669 is an azure thing to collect data i tihnk
@lordofhack53683 жыл бұрын
wouldn't surprise me if the attacker is keeping an eye on connections to the URL, after so many hits or if certain probing command come in it probably turns off to hide itself
@lehangajanayake27053 жыл бұрын
16:59 I did that mistake luckily for me it was only targeting phones
@MohaiminulIslamra2 жыл бұрын
getting iex outta comspec was the aha moment for me :D thanks john for feeding us regularly with nerd bites
@amaz4042 жыл бұрын
What if you were to curl the jsp file with the lemon-duck header?
@jkobain3 жыл бұрын
Hi, John! I heard they ported PowerShell to MacOS and GNU/Linux too. I can't say why exactly they think it'd be important to have it somewhere else than on MS Windows, still they did it. Probably to allow OS-independent malware, lol. Thanks for the videos, liked them a lot.
@stevebanning9023 жыл бұрын
FBI's gotta get their data from you somehow, no matter what OS you're on
@shelled73213 жыл бұрын
what's the point of the malware code being hidden? why does it matter if the code is going to execute anyways?
@123gostly3 жыл бұрын
Hiding from AV and other detection systems.
@blade15514313 жыл бұрын
how much preparation you make on video before recording I mean what you do with the sample you downloaded before recording
@eyyubaydin13703 жыл бұрын
Damn this is a good video. I like to see more malware analysis tutorials (walkthroughs)
@SYN-ACK-4433 жыл бұрын
Stupid question but why doesn't the (.) create a copy of the character in front of the '? Like ob'ject to objject?
@mymoomin09523 жыл бұрын
The (.) counts as part of the match. So the find-and-replace sees `j, goes "that matches my pattern `(thing)", then replaces it with (thing) - i.e. j
@Joel-gf4zl2 жыл бұрын
You shouldn't be getting a cached page if you already are including random data in the query. Maybe the date serves another purpose.
@charmquark03 жыл бұрын
Awesome video. A quick question. Where do I get a copy so as I would like to go though the process myself.
@kingpopaul3 жыл бұрын
Talos always have great and comprehensive reports.
@padreigh3 жыл бұрын
1st rule of business - add ; into everything to thwart easy line detection :D
@charismaticmedia85853 жыл бұрын
Love your videos sir.
@TheDyingFox3 жыл бұрын
19th? ouch, so it takes around 10 days/video?
@praetorprime3 жыл бұрын
test1 could come from an earlier IEX? I'm learning a lot from your unpeelings, keep up the good work!
@djosearth3618 Жыл бұрын
jus kernt more aabout regexp then ever knewed ! thxu, again ;]
@WickedNtent3 жыл бұрын
I’m new to Cub Sec and I’m doing it as a hobby. How do you get your hands on the payload without it executing so you can break it down?
@logiciananimal3 жыл бұрын
Isn't it possible the jsp page need a parameter value set to do anything?
@slamscaper128 Жыл бұрын
Watching your videos is making me want to learn Python, not to mention get more experienced in Linux.
@bhagyalakshmi1053 Жыл бұрын
Regular expressions for your Ruby details in more starting beginning explain in the regular expressions.
@kushshah36823 жыл бұрын
If only these bad actors commented their code :)
@WashingtonFernandes3 жыл бұрын
Whonder where you get this "bad stuff". I want to practice too :(
@Freeak62 жыл бұрын
So interesting !! Would be interesting if you talk about who could do such malware. Do you think a single person could have developed it? Or is it more likely a team? How long would it take for a single person to develop such complex malware?
@mattsadventureswithart57642 жыл бұрын
A single guy wrote the whole of TempleOS, including writing his own version of a "c" type language to code it in, and a lod of apps for it. It's very believable to suggest that a single person could write this malware entirely on their own. I don't know if true or if a team did this, just that's its believable that someone could have done.
@max_ishere2 жыл бұрын
Omg so cool! I want that sneak skill. It's like make IEX out of someone's computer
@ek85073 жыл бұрын
>deadbeef "i've beaten a dead horse"
@kherkert3 жыл бұрын
Great deobfuscation walkthrough! IEX still the way to go so it seems
@bhagyalakshmi1053 Жыл бұрын
How to check this wion what defryint login looking. That's wonderful icai this woinder exl explain powerful
@sliver79933 жыл бұрын
I'm gonna take a 4 hour nap I guess
@tuckerward98443 жыл бұрын
that o0knib tho...
@MultimediaCizzy3 жыл бұрын
55:48 THE RETURN OF MEMECATZ ༼ つ ◕_◕ ༽つ
@vis95363 жыл бұрын
In reference to replacing the back ticks... Can't you just replace them with an empty box? That would remove them.
@sorrowharvest58843 жыл бұрын
I'd say the idea of a crypto worm is nothing new to the whole idea. The thought of even attaching backdoors not mainly to alter information but to sap the hardware capabilities of a targeted system. Computer evolved over the conception of increased amounts of stress testing, that being said insights that the machine can handle more task automated by services and regulated thru the registers. The service of a crypto miner is to solve calculations of equations that maintain the blockchain's structure. Which it's self a symbolic link to a hash dump of data (bytes, ints, func, etc); The direction of a numeral scale of which character is switch with another cryptic character to a chain of undifferentiated value. Which holds meaning of the reason a coin hold limited capacity due to the different, individual, and separate values, in example if a blockchain was a configuration of hybals 0000 - 1111 it would only hold 16 coins. Then we divide the value by 2 which in turn increase capacity of 32 different values but only 1 coin will equal the concurrent value of 2 different values. The worm purpose is to grow. Hermaphrodism, self-replicating which in turns is in meaning of a manifestation of a virus, yet the worm needs data to consume so the data is the blockchain itself but to a signature of grasp, drop, split and divide like a middleman within the transaction of transferred bitstreams that identify the blockchain.
@popooj3 жыл бұрын
always a blast !!
@osamaamarneh57623 жыл бұрын
I'm a simple man I see a John Hammond video I click like
@kidkrow33863 жыл бұрын
What’s the new setup looking like?
@trojan85503 жыл бұрын
How is this vírus spread? ANd gratulation for this video!
@julesl69103 жыл бұрын
the human factor
@matej_grega3 жыл бұрын
I understand like 5%, but I love it!
@sammo78773 жыл бұрын
here we go again :D
@AVX512 Жыл бұрын
I don't know about yall but when someone brings Ooknib 6mook to the hootenanny in my town, everybody's goin hogwild
@tear7283 жыл бұрын
I dont really see the point of the obfuscation lol there's always some simple way to deobfuscate since they will have to eval or iex... you just end up pinpointing where that is and voila.
@GrantRuOkGovernmentSheep3 жыл бұрын
I was just about to analyse on thia
@MrRayWilliamJohnson92 жыл бұрын
Games incorporate lemon into code to then get hash rate from all users discretely
@bhagyalakshmi1053 Жыл бұрын
Fox push 43669? what subject litr
@paradoxicalegg61123 жыл бұрын
when i saw to thumbnail i thought it said "demon luck" lol
@ycart_tech6726 Жыл бұрын
Can I ask a real stupid newbie question... I have watched entire thing with long pauses in between to absorb and integrate... far as I can deduce bad guys plant a miner into the host system. It's what it says on John's title. I trust John. What I don't understand is where's the part that points to the perp's wallet??? Am I wrong to assume that if you're a smart systems security specialist guy there's more money to the Light side than just client's commissions? Also, secondary noob question... since anti malware software is mostly trained to go after specific code patterns flagged as malicious through the hard work of people like John... is it really worth it to go to such lengths to obfuscate code like this, with nonsense padding strings and similar cheap parlor tricks, which could have been much easier re written to fly under the radar from the beginning? I am a total noob and still it wouldn't take me more than a couple of days to decode the entire thing I watched on this video... I guess what I am asking ie is there any other way for anti malware software to distinguish between the traffic that a game I play online or a million little applets running on a modern home system touching base to get weather updates or some bs like that creates from that of the miner phoning to send money home, unless a guy like John working IT somewhere puts it on a list...?
@mechanicalfluff3 жыл бұрын
great video! more... MORE.
@imanuelbaca24682 жыл бұрын
I actually had this on my computer good to know what it was doing.
@idoabitoftrolling21723 жыл бұрын
Ah shite here we go again
@bhagyalakshmi1053 Жыл бұрын
What to do John master ow, to my job ,fik power sell axin 😭
@w00tklumpWn3 жыл бұрын
Epic Games Launcher looked like a valid at Port 43669, maybe they wann do stuff with it
@happygimp03 жыл бұрын
Disliked for the horribly indention style at 4:46 Never put the opening and the corresponding closing bracket not on the same column or line.
@bmbiz3 жыл бұрын
How petty. And ridiculous.
@ryonagana3 жыл бұрын
when John Hammond will quit reverse engineer malwares and will do reverse engineering of dinosaurs DNA?