From Word document to Ransomware? Investigate How Template Injection is Used to Execute Macros.

  Рет қаралды 1,629

Dr Josh Stroschein - The Cyber Yeti

Dr Josh Stroschein - The Cyber Yeti

Күн бұрын

Пікірлер: 13
@Hartley94
@Hartley94 10 ай бұрын
Thank you, DR. Josh. Great insight into the malware analysis world.
@jstrosch
@jstrosch 10 ай бұрын
Glad you enjoyed it and you're most welcome!
@x0rZ15t
@x0rZ15t 9 ай бұрын
Thank you very much Josh. Fantastic content as usual!
@jstrosch
@jstrosch 9 ай бұрын
Thank you 😊
@tysonbenson
@tysonbenson 10 ай бұрын
Josh - Fantastic comment as always. Do you plan on making a video on how to obtain the template document from a pcap file or have any resources for safely obtaining the template document via other means?
@kwesi_Osibor
@kwesi_Osibor 10 ай бұрын
very good training. Do you organize a private class for malware analysis?
@jstrosch
@jstrosch 10 ай бұрын
Yes, I have in the past but haven't had the time to offer anything lately.
@nyshone
@nyshone 10 ай бұрын
As soon as user clicks Enable Content, it pulls that remote macro and executes it right away? Or does it require any more user interaction?
@jstrosch
@jstrosch 10 ай бұрын
Once the user opens the document, it will request the remote template and load it. Since this remote template contains macros, the user will still see the enable content ribbon. if they enable that, then macros are executed and the next stage downloaded. One reason I didn't show the full sequence of events is simply because I didn't have anything running to resolve the DNS and serve the template file, it's no longer found at the original URL. I'm planning to create a follow-up video using fakenet-ng to show how to do this though :)
@pacificp
@pacificp 10 ай бұрын
when the ransomware code will be executed? Just opening the word docs or once click on enable editing button.
@jstrosch
@jstrosch 10 ай бұрын
Great question and sorry I didn't make that clear - when the user clicks the "Enable Editing" or "Enable Content" button.
@pacificp
@pacificp 10 ай бұрын
@@jstrosch Thanks
07 - Creating Trampolines and Re-Obfuscating Function Pointers
29:46
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 690
Learn How to Dissect Binary Files with the Creator of Malcat!
1:47:27
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 1,3 М.
She wanted to set me up #shorts by Tsuriki Show
0:56
Tsuriki Show
Рет қаралды 8 МЛН
«Жат бауыр» телехикаясы І 26-бөлім
52:18
Qazaqstan TV / Қазақстан Ұлттық Арнасы
Рет қаралды 434 М.
ССЫЛКА НА ИГРУ В КОММЕНТАХ #shorts
0:36
Паша Осадчий
Рет қаралды 8 МЛН
Legit Run When E is E V3 ON a i3-2350m
IUKdi MIDi
Рет қаралды 1
Learn About Evasive Malware with Threat Researcher and Author Kyle Cucci
1:54:54
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 1,9 М.
Malware Mondays #09 - File Identification and Hashing Algorithms
1:13:04
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 491
04 - Using Fakenet-NG for Network Emulation and PCAP Generation
8:31
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 349
Brobench - Debug Logs
17:04
Datasert
Рет қаралды 23
Explore Command-Line Driven Binary Transformations with Binary Refinery and its Jesko Huttenhain
1:25:25
08 - Using ZwSetInformationThread to Detach Debuggers
9:21
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 343
Advent of Code 2024 Day 23
32:34
Patrick Hogg
Рет қаралды 4
She wanted to set me up #shorts by Tsuriki Show
0:56
Tsuriki Show
Рет қаралды 8 МЛН