IDA Pro Malware Analysis Tips

  Рет қаралды 117,519

OALabs

OALabs

Күн бұрын

Пікірлер: 110
@simpleman8556
@simpleman8556 6 жыл бұрын
Your unpacking technique is saving me a lot of time everyday :)
@OALABS
@OALABS 6 жыл бұрын
That's awesome to hear! Thanks!
@QQ-xx7mo
@QQ-xx7mo 6 жыл бұрын
Thank you so much for everything, I'm learning a lot from your videos.
@simpleman8556
@simpleman8556 6 жыл бұрын
Thank you man :-) Really happy that I found your channel :-)
@andylockhart257
@andylockhart257 7 жыл бұрын
Truly epic tutorial! Kudo's guys. This is THE best IDA/Malware tutorial I have seen on the net. You guys surpass all! btw, did you know that if you place your cursor somewhere and press F4 it will run until that point. This works in most other debuggers and removes the need to manually set and remove breakpoints :) Also in the last exercise you guys are reversing a DLL. If you simply use View->Open subviews->Functions you should be able to see 'DllEntryPoint' therefore need not calculate DLL rebasing. Good practice though :) Stellar guys....just awesome :) More tutorials! pls I have learnt so much.
@OALABS
@OALABS 7 жыл бұрын
Hey thanks so much! And thanks for the tips! I'm always excited to learn a new trick with IDA : )
@breadbaconcheese
@breadbaconcheese 6 жыл бұрын
just wanna say thanks alot for this vid. i really learnt alot from your practical tips. the ida/debugger dll base address offsetting, explanations on breakpoint at ordinal vs dll entry point, etc. legit droppin gold nugs!
@binaryteam5448
@binaryteam5448 Жыл бұрын
Awesome videooo loveeee it can't wait till you get into kernel so detailed I'm going to be watching your videos all day😊😊
@nikhilt3755
@nikhilt3755 5 жыл бұрын
18:45 are you referring to stack buffer overflow?where we can use pop pop ... return inorder to execute shellcode
@OALABS
@OALABS 5 жыл бұрын
No I'm referring to a control flow obfuscation technique where the address of a hidden function is pushed onto the stack and then ret is called to redirect program flow to that function. This is a common technique used in packers which makes static analysis difficult and can also be tricky when debugging.
@nikhilt3755
@nikhilt3755 5 жыл бұрын
@@OALABS nice and tq
@lanr3356
@lanr3356 4 жыл бұрын
I loved the tutorial. thank you very much for your time and effort to bring it to us.
@vladimirchudyk995
@vladimirchudyk995 3 жыл бұрын
In 4:50 you say if the virtual offset would happen to be the real physical offset of the binary then the binary would be very "large". What do you mean exactly? Do you mean the binary would occupy a lot of real physical memory space?
@OALABS
@OALABS 3 жыл бұрын
Oh haha yeh it would be a huge file if those were the offsets. When the binary is loaded in memory it is loaded with a base address 0x400000 for exes and 0x10000000 for DLLs. So if this was a file on disk the size would be + 0x400000 bytes.
@vladimirchudyk995
@vladimirchudyk995 3 жыл бұрын
@@OALABS Thanks for the response! I watched the whole video and really enjoyed it. The only downside to it was when you preferred not to explain further concepts as that would have made the video at least 4 hours long ;)
@Leonardo47565
@Leonardo47565 2 жыл бұрын
Hello, thanks for the awesome video. I'm having some trouble with the step taken around 34:00 where you see ntdll.dll exports, my IDA (which is free version) says "module 'ntdll.dll' has no names" (and also I can see only ntdll32.dll and ntdll.dll, but NOT C:\Windows\System32 tdll.dll
@jackz4665
@jackz4665 4 жыл бұрын
Wow man you explain things so easily, you kinda spend some time talking about something you are focusing which is not really relevant, like but this is the best way to explain something, you could've turned this video into 45 minutes instead of 1:30 but without your deep explanations on how you think about things wouldve been really hard to grasp, thank you
@rayray1999100
@rayray1999100 3 жыл бұрын
I really appreciate this man!
@muffinberg7960
@muffinberg7960 4 жыл бұрын
Awsome video. Really enjoyed watching it
@Marselmarsemars
@Marselmarsemars 4 жыл бұрын
very useful video, made a lot of bookmarks
@akiraperera9574
@akiraperera9574 2 жыл бұрын
Hi, in the structures part of IDA, is there a way to display all values of one value in a list? Thanks.
@OALABS
@OALABS 2 жыл бұрын
I don't know what you are asking, but you have asked it twice on two different videos so A+ for motivation! Join our discord and maybe we can figure it out together?
@rocketsurgeon7057
@rocketsurgeon7057 3 жыл бұрын
Excellent. Give us more.
@OALABS
@OALABS 3 жыл бұрын
Moar you shall have! Check us out on Twitch too www.twitch.tv/oalabslive
@ReubenSammut
@ReubenSammut 6 жыл бұрын
First of all great tutorial. Just getting into Malware analysis (currently reading Practical Malware Analysis) and your tutorials are some of the best I've seen so far. Just a question regarding setting breakpoints after taking memory snapshots (I'm not sure it really makes sense). If ASLR is turned off, shouldn't the base of the exe + stack, heap and libraries be mapped to the same locations in memory, hence allowing you to keep the breakpoints from one run to the other after unpacking?
@OALABS
@OALABS 6 жыл бұрын
Thank you, and good point! So you may notice that that PE and DLLs do reload in the same location which makes thing easier but I often switch debugging environments so it's a habit to not rely on this. Also, just to clarify the memory snapshot only decorates your IDB it does not reflect the actual debug environment (ie. if you take a snapshot with one debug host and switch to another IDA won't arrange the debug environment to match the snapshot) it is not like a VM snapshot. So if you place breakpoints in the snapshot you cannot rely on them being placed accurately at debug time, I know that was not your question I just wanted to clarify for anyone who may be confused.
@あまね-y6t
@あまね-y6t 3 жыл бұрын
the best ida tutorial ever seen.Cool
@willsmith798
@willsmith798 3 жыл бұрын
Hello I am not able to locate the file at the link you listed. Is there any new updated version of the link?
@StefanRothenbuehler
@StefanRothenbuehler 5 жыл бұрын
Great tutorial. I have a similar setup for remote debugging. Is there a particular reason why you don't just leave the path for the remote program to debug as it is? They lay in the same folder on the same shared folder (same drive letter mapped Z:) on both VMs. This is how I do it. I just thought there might be a reason other than to explain the concept why you don't just leave the path as it is. Keep up your great work! Really enjoy it.
@OALABS
@OALABS 5 жыл бұрын
That would probably be easier haha! I don't really have a good explanation, except this is just the way I started doing it. I'll try your method though, seems like it would save some potential confusion. Thanks for the tip : )
@chaitanyabhojane498
@chaitanyabhojane498 2 жыл бұрын
where is the demo files guys i cant find? I want to go through by practising on my side too!
@alyagomaa5101
@alyagomaa5101 4 жыл бұрын
do you have any ida how to get IDA's decompiler to show arr[i] instead of *( i + arr)?
@OALABS
@OALABS 4 жыл бұрын
Yes you will have to define the var "arr" as a struct. We cover this in detail in our reversing C++ tutorial kzbin.info/www/bejne/pV6pd3p_odSrrKc
@eamonnryan4092
@eamonnryan4092 6 жыл бұрын
Excellent video, thanks for making!
@og46829
@og46829 4 жыл бұрын
You're awesome! Thank you for your time, efforts and knowledge :) Can you please make a video in which you make something like a long-term roadmap for beginners to learn malware analysis?
@OALABS
@OALABS 4 жыл бұрын
This is a great suggestion and it has been a long term goal of ours but it is a big project that we don't want to tackle until unpacme is fully stable and doesn't take as much of our time.
@JohnSmith-mf3dq
@JohnSmith-mf3dq 3 жыл бұрын
Thanks buddy for the video You ever used capa explorer with IDA pro?
@OALABS
@OALABS 3 жыл бұрын
Yeh, just released a video on it: kzbin.info/www/bejne/ppelcmmvabt_ra8
@Jakob6174
@Jakob6174 4 жыл бұрын
What was the plugin you have installed that caused the crash? I have the same problem. Also this is a fantastic tutorial, I really needed something like this to supplement while reading the IDA Pro book, so thanks a bunch.
@satya_dau
@satya_dau 6 жыл бұрын
Hi, Nice tutorial. But I am facing an issue here. I was following some tutorials on IDA and couldn't figure it out why my IDA doesn't recognize any local variables when I launch any executable. Can anyone help me here?
@iwanpon_pon3062
@iwanpon_pon3062 3 жыл бұрын
how to edit the file so if there is a hidden command
@diegocracker
@diegocracker 3 жыл бұрын
Melhor dos treinamento, isso porque faço analise de malwares e apreendi muito com esses vídeos teóricos e práticos. Thanks.
@OALABS
@OALABS 3 жыл бұрын
Muito obrigado!
@malware_reverse
@malware_reverse 5 жыл бұрын
Great Video guys. I really learned a lot from it, especially debugging DLL. One question, could you guy do a demo video for debugging DLL contains Sericemain function which is running as a service. It is hard to me to find a effective way to debug using IDA. Thank you so much!
@OALABS
@OALABS 5 жыл бұрын
Hey that's a great idea! I'll add it to the list. If you know of any malware that installs itself as service can you send it out way? Thanks!
@malware_reverse
@malware_reverse 5 жыл бұрын
@@OALABS Thank you!. I tried to learn how to debug DLL servicemain. Found one:www.virustotal.com/#/file/1b3c22ad57d48674e3cad45794daa6e08edad45ad7a1d1c2ac871e1ff2043a88/details
@mozark1043
@mozark1043 6 жыл бұрын
Hey, great tutorial packed with info. Recommend breaking up the sections in the future for quick access (or have quick nav buttons at the start). Any chance you could cover a "get IDA pro setup with IDA python on Windows" tutorial? The IDA python book assumes it's already installed and online resources are scarce. EDIT: Nevermind, apparantly the free version doesn't support IDAPython
@OALABS
@OALABS 6 жыл бұрын
Hey glad you enjoyed the tutorial! If you expand the description below the video you will see the quick links you are looking for : )
@lougvar
@lougvar 3 жыл бұрын
Amazing! Thanks!
@pentesterdgb6858
@pentesterdgb6858 6 жыл бұрын
What version of IDA Pro is this? I am not seeing any option for remote debugging in the UI for the 5.0 freeware version.
@OALABS
@OALABS 6 жыл бұрын
Unfortunately I don't think the the free version of IDA comes with the remote debugger, but I think it has a local debugger that you can use. With the freeware version there is no problem using the local debugger on the same VM as IDA since there is no license that could be stolen by the malware.
@joppezorro4360
@joppezorro4360 3 жыл бұрын
Very good tutorial. Interesting observation though. In my setup I run two virtual win10 64bit. then the API call (openKeyexW) goes to kernelbase and not advapi32. IDA says advapi32 but if you follow the execution you will see that it goes to kernelbase.
@sportshome6504
@sportshome6504 2 жыл бұрын
where can I get the sample of the malware?
@OALABS
@OALABS 2 жыл бұрын
You can download them from malshare here: malshare.com/sample.php?action=detail&hash=7f0fdddf5905886532c8a652abed1b6c malshare.com/sample.php?action=detail&hash=90aff54cf69ad647eec925f361a34798
@sportshome6504
@sportshome6504 2 жыл бұрын
@@OALABS Thank You Sire
@EnduranceT
@EnduranceT 7 жыл бұрын
This is awesome. Thanks so much! Please cover some more unpacking techniques for advanced packers; not a lot of good content in English on this and the tuts4you stuff is old and often unreliable. Thanks again!!!! Awesome video!!!! Subscribed/Liked!
@OALABS
@OALABS 7 жыл бұрын
Thanks so much! We can definitely put out some more unpacking focused videos. I also highly recommend the unpacking tutorials from MalwareAnalysisForHedgehogs kzbin.info/www/bejne/bnLcfmWipN9md7c and the unpacking video series from Hasherezade kzbin.info/www/bejne/jHiymI1nd72HiKc. I learned a ton from both of them : )
@DL-bp7jp
@DL-bp7jp 6 жыл бұрын
hi i am trying to download the sample files (i'm quite new to IDA...) and end up downloading a file called: 90aff54cf69ad647eec925f361a34798 where can i find the real sample files?
@OALABS
@OALABS 6 жыл бұрын
You can create a free account on malshare and download the sample from there: malshare.com/sample.php?action=detail&hash=90aff54cf69ad647eec925f361a34798
@DL-bp7jp
@DL-bp7jp 6 жыл бұрын
om i got the files - loaded them to ida pro 7 . when i check the imports tab it is empty for the exe sample. any idea why?
@redpillcommando
@redpillcommando 5 жыл бұрын
@@OALABS I too am having a bit of trouble finding the exe file. All I got is a .rsrc folder and three other files. I come from a UNIX background, never did a lot of work with Windows. What am I missing?
@arunp9703
@arunp9703 7 жыл бұрын
This is awsome man...keep posting
@syedalizainnaqvi9450
@syedalizainnaqvi9450 3 жыл бұрын
Hi. Can you make course or videos on understanding assembly for malware analysis. This is where I am stuck.
@LolloLong
@LolloLong 5 жыл бұрын
Great tutorial
@OALABS
@OALABS 5 жыл бұрын
Thanks : )
@nz9273
@nz9273 5 жыл бұрын
Hi, I am having problem to download the tutorial files from the link that you provided in the description as I couldn't find the download button. I would like to recreate your steps so that I could understand as I have unit that is related to this. Thanks.
@redzaizudin6231
@redzaizudin6231 5 жыл бұрын
kzbin.info?q=https%3A%2F%2Fmalshare.com%2Fsample.php%3Faction%3Ddetail%26hash%3D7f0fdddf5905886532c8a652abed1b6c&redir_token=UFvNV5lcUSQmZ1Oum6sHkuh64il8MTU3MDg2NTAxMEAxNTcwNzc4NjEw&stzid=UgwJLRnd_L9K1VpxNGl4AaABAg.8sOD2g3ryJg8sQGZeZhwLx&event=comments kzbin.info?q=https%3A%2F%2Fmalshare.com%2Fsample.php%3Faction%3Ddetail%26hash%3D90aff54cf69ad647eec925f361a34798&redir_token=UFvNV5lcUSQmZ1Oum6sHkuh64il8MTU3MDg2NTAxMEAxNTcwNzc4NjEw&stzid=UgwJLRnd_L9K1VpxNGl4AaABAg.8sOD2g3ryJg8sQGZeZhwLx&event=comments
@shinvipo
@shinvipo 3 жыл бұрын
Are you using Mac OS?
@OALABS
@OALABS 3 жыл бұрын
Yes MacOS as my host with a Windows VM.
@LaurentLaborde
@LaurentLaborde 4 жыл бұрын
Ctrl-G in the instruction trace window is black magic
@LaurentLaborde
@LaurentLaborde 4 жыл бұрын
i congratulate myself for this comment because i already forgot what it's doing :D
@LaurentLaborde
@LaurentLaborde 3 жыл бұрын
twice now :D i keep watching this video every few month and i still learn from it :)
@nullnull6032
@nullnull6032 4 жыл бұрын
That is useful, here is a sub :D
@albaniaiptv8335
@albaniaiptv8335 4 жыл бұрын
When i want to mod syntax for arm ,pop up this warning Sorry, this processor module doesn't support the assembler.
@markmanning2921
@markmanning2921 10 ай бұрын
You spend a great edeal of time explaining what you are not going to be explaining instead of explaining all thye things you ARE going to be explaining.
@OALABS
@OALABS 10 ай бұрын
This would have been very helpful advice 6 years ago!
@redpillcommando
@redpillcommando 5 жыл бұрын
Thank you for this tutorial. Once I have finished watching it and working through the examples, I will return to my lab and plan for tomorrow night, when I will try to take over the WORLD! To save it from the REAL super villains. :-)
@helbegh3370
@helbegh3370 6 жыл бұрын
\Sessions\1\BaseNamedObjects\39226fe8-e227-494b-a788-8a992c14d8fe
@tugelek9678
@tugelek9678 3 жыл бұрын
dzieki dziala
@Mezzosd
@Mezzosd 5 жыл бұрын
how to download ida pro?
@OALABS
@OALABS 5 жыл бұрын
You can download the freeware version here www.hex-rays.com/products/ida/support/download_freeware.shtml. Or if you want to purchase it and use the full feature set we have displayed here you can use this www.hex-rays.com/products/ida/order.shtml
@utayasurian419
@utayasurian419 4 жыл бұрын
How to hide a flag in a malware like most CTFs?
@alyagomaa5101
@alyagomaa5101 5 жыл бұрын
thank you
@DL-bp7jp
@DL-bp7jp 5 жыл бұрын
Hi, Can you share a new download link to tutorial files?
@OALABS
@OALABS 5 жыл бұрын
You can download them from malshare here: malshare.com/sample.php?action=detail&hash=7f0fdddf5905886532c8a652abed1b6c malshare.com/sample.php?action=detail&hash=90aff54cf69ad647eec925f361a34798
@jaydev8148
@jaydev8148 7 жыл бұрын
bro, from where can I download the demo app
@OALABS
@OALABS 7 жыл бұрын
Oh sorry about that. You can create a free account on malshare and download it there malshare.com/sample.php?action=detail&hash=90aff54cf69ad647eec925f361a34798
@dirtbikersteve
@dirtbikersteve 6 жыл бұрын
please use sites like mega.co.nz that don't require registration
@000maestro000
@000maestro000 7 жыл бұрын
This is such a great tutorial, I wonder if you can share some knowledge about IDA scripting, I am recently getting into it but finding it kinda cryptic.
@OALABS
@OALABS 7 жыл бұрын
Hi Dan, we can definitely cover some IDA scripting in our upcoming videos ... in the mean time I highly recommend the The Beginner's Guide to IDAPython from Alex Hanel, it's amazing and has tons of great examples leanpub.com/IDAPython-Book
@LaurentLaborde
@LaurentLaborde 4 жыл бұрын
i watch this one one on a regular basis.
@papusa9878
@papusa9878 3 жыл бұрын
Nice
@zeuscybersec659
@zeuscybersec659 4 жыл бұрын
Amazing Content!! I have a youtube channel too and i will be Starting Reverse Engineering after i finish Black Hat Python which i am currently reading. Will appreciate if you can tell me some good resources to get started in Reverse engineering and malware Analysis.How is the book secrets of reverse engineering? Also i would be privileged to have you on my channel for a cybertalk someday❤️
@RileyPorter
@RileyPorter 6 жыл бұрын
OALabs. Don't rename the function pointers.... Use the renimp.idc that comes with IDA Pro. It will AUTO populate the IDB with the parameter names as well.
@OALABS
@OALABS 6 жыл бұрын
Nice tip! Thanks!
@georgesanderson918
@georgesanderson918 3 жыл бұрын
33:02
@hS-fx7hr
@hS-fx7hr 6 жыл бұрын
hi a great tutorial thank you . make the voice louder
@OALABS
@OALABS 6 жыл бұрын
Thanks! About the audio our editing skills are slowly improving... audio should be mostly fixed on our newer videos : )
@saultube44
@saultube44 3 жыл бұрын
Note: ever 0x100000=1 MB
@bilgenebrudisbudak5288
@bilgenebrudisbudak5288 3 жыл бұрын
dude what is that
@metaorior
@metaorior 3 жыл бұрын
dude i got win32.pioneer i can't get rid of this shit
@OALABS
@OALABS 3 жыл бұрын
Best free source for malware removal help: www.bleepingcomputer.com/forums/f/22/virus-trojan-spyware-and-malware-removal-help/
Unpacking Process Injection Malware With IDA PRO (Part 1)
42:28
진짜✅ 아님 가짜❌???
0:21
승비니 Seungbini
Рет қаралды 10 МЛН
Почему Катар богатый? #shorts
0:45
Послезавтра
Рет қаралды 2 МЛН
Jonsbo N5 NAS Case Build - GET IT RIGHT, FIRST TIME
21:52
NASCompares
Рет қаралды 2,3 М.
Practical Malware Analysis Essentials for Incident Responders
50:49
RSA Conference
Рет қаралды 151 М.
How To Defeat Anti-VM and Anti-Debug Packers With IDA Pro
48:37
An Intro to Binary Ninja (Free) for Malware Analysis
20:03
Anuj Soni
Рет қаралды 6 М.
Make Malware Analysis FASTER with Binary Emulation
58:05
John Hammond
Рет қаралды 42 М.
Quick And Dirty Binary Patching With A Hex Editor
20:38
OALabs
Рет қаралды 49 М.
Google I/O 2012 - Go Concurrency Patterns
51:27
Google for Developers
Рет қаралды 821 М.
How to Crack Software (Reverse Engineering)
16:16
Eric Parker
Рет қаралды 795 М.