I never thought I'd be spending my friday afternoon watching a cross between seth rogen and louis c.k. analyze malware, but here we are.
@pinobeppo92873 жыл бұрын
"146 IPs, we could do this forever..." Well, I 'd definitively watch that! Please keep these malware analysis videos coming, they are great. I really enjoy seeing all the thought process behind the analysis.
@Krysstof3 жыл бұрын
2 powershell tips for your future adventures: - you can use > to redirect output in a file, it is after all a "shell", instead of | out-file - parenthesis around something are evaluating that something and treat is a variable, so if you have an array built on the fly and want the first and third char [1,3]. in your case around 31:15 the variable $VerbosePreference is cast as string : [string]$VerbosePreference then with parenthesis around it, it avoids storing this into a variable to work with it, it's the equivalent of $a=[string]$VerbosePreference ; $a[1,3] when you do ([string]$VerbosePreference)[1,3] just my 2 cents :)
@allidoisspreadfalseinforma76253 жыл бұрын
You spread lies
@AntoniGawlikowski2 жыл бұрын
If anyone is using EQ for their computer sound, I found that cutting down 2k Hz range makes the sound much less obnoxious (a bit more swampy, but intelligible and sans all that awful highs). Hope that might help someone. Still, despite the sound problem, great video as usual!
@GodModeMaker3 жыл бұрын
Was just reading about MSHTA and you come up with this. Your timing is perfect John! Awesome xD
@wesleyhall67273 жыл бұрын
"It builds character" I love it 😄
@CJMAXiK3 жыл бұрын
As soon as I saw the Russian text I was screaming "SLOT MACHINES!!!" )) Really cool analysis, kudos!
@jameselliot91143 жыл бұрын
50:25 - "that's math" thank you for that profound insight
@AlydeahMclydersan4 ай бұрын
Thanks John for your talking through analysis techniques. Its extremely helpful to learn how you logic your way through reverse engineering these scripts. Im hooked!
@desjomp3 жыл бұрын
john , no need to say sorry for the sound or or or , if you broadcast like in 1950 in short wave or long wave or in morse ,or black and white , always happy to see a new upload !greetz rootsh3ll1
@StanLTU3 жыл бұрын
I love these videos. I am learning so much about malware.
@kenprochaska22862 жыл бұрын
I learn a ton everytime I watch one of your videos. You are da man!!!!
@cacurazi2 жыл бұрын
13:28 summery of .this (object): .this in JS will keep track of the instantiation of the code that is running. Like all the functions and variables that were being set/ instantiated. So, this object keeps track of all of the functions and vars that we have initially defined
@praetorprime3 жыл бұрын
have a try{}catch{} for the algorithm. Entertaining and informative as always, keep it up!
@getellied3 жыл бұрын
Oh my goodness, this was crazy Really interesting to see the cool (and shady, I guess) techniques they use John, ty for this video (and don't worry about the audio ;) )
@vbExpert4You3 жыл бұрын
I enjoyed the video and always enjoy watching people reverse engineer code. When you translated the text to English to find "slot machines" you missed the obvious exclamation "Jackpot!"
@_DeProgrammer3 жыл бұрын
If you use vscode instead of sublime it has a beautifier module and a bunch of other helpful modules and a built in console.
@valterpereiracjr Жыл бұрын
You ROCK JH. Great job. Thank you!
@monkz18132 жыл бұрын
Thankyou John and Thankyou for all of the free lessons! I appreciate it so much and have learned most of what I know to this day from you. Thankyou
@padrebeaversmsk11783 жыл бұрын
the site you explored is just russian illegal online casino "Вулкан" which was very common in Russia. it is known for very aggresive advertising. The adress is probably was own by command center but it was unpaid or got banned after that domain was sold to casino or just use it as a filler for sold domain. Thank you for your videos it is fun and educational.
@comicdev3 жыл бұрын
In the try-catch chain, the errors are basically an antivirus bypass. The double brackets ([[), they first create the string "message", and in JavaScript, you can select properties using strings, like string.split() can also be called as string["split"]().
@peaceforever36613 жыл бұрын
This was awesome John. Love your content. A big fan.
@marckerkvliet29993 жыл бұрын
Great to watch! Entertainment and educational.. thx!! (Audio is not so bad)
@dand.29443 жыл бұрын
f great work, love the videos.
@brentbice11513 жыл бұрын
Yay! strings for the win! :-) Remember when you were looking at that powershell script that was throwing an error? Somewhere in the midst of that I thought I saw a "SilentlyContinue" or "ContinueSilently". Now, I'm now powershell superhero - I R a linux/unix geek - But maybe that's an option to tell powershell to keep interpreting if it gets any errors? More red herrings to trip up folks dissecting malware?
@Lov2dance873 жыл бұрын
So I'm new to your channel and can I just say, I'm getting some serious Ed Sheeran vibes right now! Can't wait to dive into some videos : )
@kitrodriguez9923 жыл бұрын
I got more of a JScript nerd Charles Cornell vibe. LMFAO
@bhagyalakshmi1053 Жыл бұрын
You have in a lot of funny explaining in the other sources big point is a small to smile to explain so nice explaining master up and CEO 👋
@AmanKumar-tm8id3 жыл бұрын
I am taking notes on reverse-reverse engineering, learning how to write and obfuscate malware ;)
@ericellenwood3 жыл бұрын
I have been watching for a while. This is the most interesting sample you have reversed. Best Video
@soncrypto87942 жыл бұрын
I just started with cybersecurity, but it's so fun watching this.
@JonSnyderfudge3 жыл бұрын
This was great. Nice job 👌
@lopiid3 жыл бұрын
Well done John, thank you!
@alincraciunescu3 жыл бұрын
Thank you, for this video!
@nothingnothing17993 жыл бұрын
Accidentally clicked on this before anyone else.
@viam11013 жыл бұрын
Awesome video man, Appreciate it!
@szirsp3 жыл бұрын
41:19 the C# code seems to be the AMSI bypass LoadLibrary amsi.dll, GetProcAddress AmsiScanBuffer (or rather DllCanUnloadNow then search for the address), then VirtualProtect to overwrite it www.contextis.com/en/blog/amsi-bypass
@ripcityraider94693 жыл бұрын
I hope that one day I can become half as good as you are. You are an inspiration my friend.
@denisulianov96273 жыл бұрын
It's adv for russian online casino. Cause it became out of law in Russia. I meant it trying to look like it. And that "vulkan" was insanly popular 8-10years ago when it had been legal.
@axo1373 жыл бұрын
damn I watch your videos and I am not even into programming or cyber security. quality content, keep on delivering :D
@pseudouser93603 жыл бұрын
This is mindblowing ^^
@matthewlandry13523 жыл бұрын
Hey John one of your best videos IMO. For a long time I have always wanted to watch someone dissect Windows Malware and your videos scratch that itch like no other. I just wonder is this like exactly what you do at work or is your analysis At huntress more in depth? Ps: Leave it to John to end up at a shady Russian slot machine 🎰 online Casino. I laughed so hard.
@raulcattelan45063 жыл бұрын
Thanks for the video
@djneohlp3 жыл бұрын
so that payload doesn't look like a pe executable but an actual x86 binary memory dump... which they load back into ram to execute
@christopherboisvert69023 жыл бұрын
Wow crazy !
@hellofriend30913 жыл бұрын
Thank you for this session. Just one humble request please discuss about new sudo flaw and wap3 vulnerability...
@josephze85433 жыл бұрын
Where can I find these malwares that he is analyzing?
@Handskemager3 жыл бұрын
The more of your videos I see, the more amazed and scared I am at the true power of Powershell.. Thank god I’m using UNIX systems
@HuhnK0t3 жыл бұрын
i'm somewhat new to the channel but i am still hoping to get to know.. uh.. ooknib? soon? what an awesome word
@orgozlan3233 жыл бұрын
Amazing thank you !
@ripcityraider94693 жыл бұрын
You are awesome!!!
@1wk4073 жыл бұрын
tbh nice job cleaning up the audio all things considered, i forgot about it for most of the video
@mxschmitt_3 жыл бұрын
Awesome video
@nikolas87413 жыл бұрын
Amazing!
@vadimtoptunov91523 жыл бұрын
It's so funny to see my native language here! It's funnier when someone have to translate it. :))
@agroforestryconsultancyroz31572 жыл бұрын
Nice to see how cyberserutity works, it looks like solving a puzzle or Mario game.
@anonymousguy1212773 жыл бұрын
Thanks johnh. Your videos rock. Love, a data analyst maybe getting into cyber security?
@kennymd3 жыл бұрын
Hey John, what's you opinion on bash alternatives like fish etc.? Love the videos btw keep up the good work
@shaolinsword66983 жыл бұрын
Question why not fping all the ip addresses? I still learning
@7thAttempt3 жыл бұрын
This thing was wild 😂
@user-kd1mp5qw5e3 жыл бұрын
this is insane haha never seen someone breakdown script at all it's got me mad intrigued. would each little intricate step of hiding and encrypting bits be done separately or is there some sort of preset that would be applied to a whole sequence? Im actually shocked at how much im enjoying watching it being worked out although i have no clue whats happening visually apart from getting neater hahais there many good forums for novices? im keen on racking my brain on this stuff
@custume3 жыл бұрын
good one
@TheWorthyWubba3 жыл бұрын
You can also use the Chrome Dev Tools to beautify js too.
@joacoordonez19733 жыл бұрын
where can i send malwere to be analysed???
@fantasmosnugget Жыл бұрын
I could watch this shit for fucking hours, dude
@charlieisacatwithseizures2 жыл бұрын
I dont know why but this gives me the creeps so bad like its so creepy to uncover their motive, what they are trying to do and get.
@sydneypemberton51383 жыл бұрын
John! Get an IDE. It reformats your code AND it can rename variables very quickly and precisely.
@nothingnothing17993 жыл бұрын
Been thinking this for a while plus he could customize it easily
@karnafelfamily75903 жыл бұрын
John, based on the amount of malware/ransomware and etc. you have done. What is the common port is used for C2 communication?
@Optable Жыл бұрын
The port is either collected or designated exactly
@conqu3red5453 жыл бұрын
I few years ago my computer was nearly infected from me opening an hta file. Anti virus stepped in though. Unfortunately I didn't keep a copy of the file after that, it would have been fun to analyse
@viv_24893 жыл бұрын
Liked the video
@ilyasabi89203 жыл бұрын
These IP addresses look like general stockpile of proxies back in the day we used to do sketchy shit when we were trying to bypass WAP/GPRS firewall shenanigans.
@whtiequillBj2 жыл бұрын
You say that IEX means that the code isn't written to disk. Does that mean that it is written into RAM directly?
@catalingavan91982 жыл бұрын
it's almost like refactoring a legacy application :)
Been watching your content for a while after finding. Just one question about your code cleaning: why don't you just run prettier to automate the process instead of going through these blobs of mumbo-jumbo by hand? Is there any reason? Oh yea, you mentioned the reason while speaking about beautifier... mb.
@Alterpalm3 жыл бұрын
1:04:11 Оо, русские буквы, какая неожиданность!)) Look out, John!! Russian school kids will snatch all your CS:GO skins =)
@imadbouaziz84413 жыл бұрын
Hello , where can i found this malware file ? thanks
@nandobordas3 жыл бұрын
I've recently gotten into watching your videos; as someone with a mild background in coding, they're extremely informative and fun to watch, but I have to admit that sometimes I kinda feel you miss the really, REALLY obvious stuff... Like at 31:57 -- it's not giving you the output you want because you're not treating $VerbosePreference as an object, you're casting and trying to immediately use as an array without wrapping in parentheses. That's why it works a few moments later, because you copy the entire thing from the file (including the parentheses).
@LiquidBlaze90003 жыл бұрын
Hey John! I have a sus url from a text message. You think you can disect the contents of it? :) (I don't know where else to contact you about this..)
@djcb41902 жыл бұрын
"RENDER IMMEDIATELY!"
@tehvvisard3 жыл бұрын
LiveInternet.. crochet.. feels like a 3 am search hole
@ianowens19053 жыл бұрын
You should look into some old malware on machines like the Commodore 64, I think that could be really cool
@whtiequillBj3 жыл бұрын
I see you use Sublime Text, why don't you use: https: // packagecontrol . io / packages / HTML-CSS-JS%20Prettify. I'm just wondering why go though the extra step of finding a web application to do it and not use a built in plug-in. Ampersand is evaluate silently
@julesl69103 жыл бұрын
Audio is fine, this isn't going on a vinyl audiophile 180 gram
@5DimesPlayer Жыл бұрын
All of John's videos are very fascinating, but I have no clue on what he's doing lol
@_JohnHammond Жыл бұрын
same lol
@5DimesPlayer Жыл бұрын
@@_JohnHammond I doubt that! You can take a string of text containing HDHSHDLSDJFN284+$+3!2!"?3(3(&?"!2!_+3+_; and decode it to: Hello, I am John and I am very proficient at what I do.
@drdisexon39523 жыл бұрын
Where can I get such awesome samples of malware. Don't tell me malwarebazar
@alexandermikael36153 жыл бұрын
13:49 look at this parent child this object.. :p
@btno2223 жыл бұрын
LINUS TECH TIPS
@PR1NC33 жыл бұрын
I didn't know that KZbin algorithm cheks your wallpaper Btw just algorithm things
@SankalpSaxena993 жыл бұрын
Algorithm Stuff !!!
@0xbinHex3 жыл бұрын
13:38 :D
@imadbouaziz84413 жыл бұрын
good job , you can share the files with us ?
@rodrilea1 Жыл бұрын
F Thanks John
@Heavenig3 жыл бұрын
So this is how to build malware for Real? Am New to hacking, please where can I'll from?
@shaolinsword66983 жыл бұрын
SOC shift over time for malware analysis
@reccer783 жыл бұрын
What would be cool if you get one of their IPs and try to root it.
@kraemrz3 жыл бұрын
"F" Don't want this malware 😨
@Sawta3 жыл бұрын
23:29 "...-1 + 1..." Oh man, I _think_ I know what they were going for, there! hackerman.activated 🐱💻👨💻
@bhagyalakshmi1053 Жыл бұрын
Mliwer 🐛⚒️ skills tools
@_AN2033 жыл бұрын
hey john I hope you participate in the HTB event Cyber Apocalypse 2021 if you do plz write ups and the live if you did