IDA Pro Tutorial - Reverse Engineering Dynamic Malware Imports

  Рет қаралды 46,041

OALabs

OALabs

Күн бұрын

Пікірлер: 89
@OALABS
@OALABS 5 жыл бұрын
For those of you interested in attempting this in Ghidra, check out this excellent blog post: blag.nullteilerfrei.de/2019/11/09/api-hashing-why-and-how/
@EvilSapphireR
@EvilSapphireR 4 жыл бұрын
Super late squad, but loved the video! Loved your clarity of thinking, clearly your years of expertise is showing. Just wanted to point out for anyone else following here, the 4th byte and the 22nd, 23rd and 24th bit of the hash is used to determine the DLL via the right shift of 21, the rest of the bits (1st, 2nd bytes, lower 4 bits of 3rd byte and 21st bit) is used to determine the function name via the AND of 0x1FFFFF.
@ExploitedShells
@ExploitedShells 5 жыл бұрын
All I have to say, is a huge thank you. Your content helped me so much, and I improved myself so much because of your tutors. Again, thank you for your content!
@OALABS
@OALABS 5 жыл бұрын
That's awesome to hear thanks very much : ))
@billtibbs5768
@billtibbs5768 5 жыл бұрын
Definitely please post more like this. Actual RE into the guts of malware is very helpful. Personally, I’m interested in the comms/command and control and of course any watching how you an experienced professional approach it and use the tools like IDA.
@OALABS
@OALABS 5 жыл бұрын
Stay tuned, I think we will cover some C2 stuff soon : )
@EvilSapphireR
@EvilSapphireR 5 жыл бұрын
As someone who's looking to switch from Network Security to RE and Malware Analysis, you're doing God's work man. I'm looking to do GIAC GREM certification and your tutorials are a huge confidence boost that I can actually do this! Thanks so much!
@OALABS
@OALABS 5 жыл бұрын
Hey that's awesome to hear. Thank you so much : )))
@2nc4yproduction
@2nc4yproduction 3 жыл бұрын
probably the best video about this subject in youtube
@Thiago1337
@Thiago1337 5 жыл бұрын
Quality content right here. Keep it up. Step by step videos are long, but the amount of knowledge contained on them is priceless.
@DmytriE
@DmytriE 5 жыл бұрын
The actual Reverse Engineering aspect is very interesting and helpful. There are definitely somethings that you just won't get from the tips and tricks of unpacking malware. Eventually, you have to get into the weeds and I'm glad that you are willing to share you insight and knowledge. Looking forward to the IDA scripting video!!
@demarcusthomas601
@demarcusthomas601 5 жыл бұрын
Please continue additional videos such as this. Very helpful to see your process for analyzing samples.
@dejadk
@dejadk 5 жыл бұрын
I love reverse engineering and all I want to do is make a career of it. Thank you so much for creating these videos.
@typedeaf
@typedeaf 3 жыл бұрын
Great video. The whole time I was screaming at you, 'It's ANDing 21 bits, not a word!'
@OALABS
@OALABS 3 жыл бұрын
🤣🤣🤣🤣
@Juan-je3ml
@Juan-je3ml 5 жыл бұрын
As usual! Pure quality! Helps me learn a lot! Thanks man!
@MrLuchoni3
@MrLuchoni3 4 жыл бұрын
+1 . for more posts like this. its really cool to see how he thinks about and approaches the analysis.
@ДенисЮзвик-м6о
@ДенисЮзвик-м6о 5 жыл бұрын
Happy to see a new video. Thanks. I vote for "tutorial style" videos :)
@84h81
@84h81 2 жыл бұрын
nice intro bro..will recommend hearing it again 10/10.
@alphatsar6141
@alphatsar6141 5 жыл бұрын
Excellent material! Would make for a great tutorial series in itself. There's not enough out there that ties together the disparate skills into an actual malware RE workflow perhaps all the way to a report deliverable. Would love to see more of that. Thank you :)
@purpler3m910
@purpler3m910 5 жыл бұрын
Love this. Thank you lots! i will go home and follow step by step. This helps anyone new to reversing understand the hows of malware, is more hands on. I hope you guys do more of reverse engineering. Maybe without IDA Pro, but using some open source tools. Anyways Thanks OALabs
@OALABS
@OALABS 5 жыл бұрын
: ))))
@anonymousquoll9316
@anonymousquoll9316 5 жыл бұрын
The "0x1FFFFF is just the lower word part" threw me for a loop until you caught your mistake later on. Other than that, this was a great video.
@OALABS
@OALABS 5 жыл бұрын
OMG yeh sorry about that. I thought it was 4 F's not five haha. Wanted to leave that in there though so you can all have a peak behind the curtain of how these things are made : )
@jacekklepacki8301
@jacekklepacki8301 5 жыл бұрын
Your videos are awesome, thanks to you I finally got into malware reversing. Can't wait for the scripting video.
@OALABS
@OALABS 5 жыл бұрын
Thanks! That's awesome to hear!
@AetherlabNet
@AetherlabNet 5 жыл бұрын
Great video, looking forward for more like this. If I have the time, I will try to reproduce it in Ghidra.
@turner7777
@turner7777 3 жыл бұрын
you never dissapoint!
@thehen101
@thehen101 5 жыл бұрын
Another excellent video. Your channel has really helped me to learn the ropes when it comes to IDA, and this video is no exception. Edit: can't wait for the scripting tutorial.
@malware_reverse
@malware_reverse 5 жыл бұрын
Another awesome video. Looking forward to seeing the ida script for this one too.
@CosmoCopulates1
@CosmoCopulates1 5 жыл бұрын
More of these types of videos! Great job
@hapja
@hapja 5 жыл бұрын
Fantastic vid, love this type of content.
@Extys
@Extys 5 жыл бұрын
Thanks man, you're truly an inspiration to me.
@ItzZyannYT
@ItzZyannYT 3 жыл бұрын
what key did you use by renaming the function? in this part 12:17
@OALABS
@OALABS 3 жыл бұрын
You can highlight the function and press "n" to open the name text box like you see in the video.
@ItzZyannYT
@ItzZyannYT 3 жыл бұрын
@@OALABS ohh
@ItzZyannYT
@ItzZyannYT 3 жыл бұрын
@@OALABS also one question, is theres anyway to generate all byte codes of functions?
@OALABS
@OALABS 3 жыл бұрын
I'm not sure what you mean, but if you have a specific example feel free to jump on our discord and ask there. Make sure you are specific though and post a link to the sample you are analyzing.
@humbertocaron334
@humbertocaron334 2 жыл бұрын
make more videos like this. It is awsome.
@mr_ehmed
@mr_ehmed 5 жыл бұрын
please make beginner series for IDA pro plz plz big fan of you
@OALABS
@OALABS 5 жыл бұрын
You can check out our old IDA tips video... it's from a while ago so the editing isn't quite as good but it might have some info that is useful for you kzbin.info/www/bejne/p3S0g36Clt9lpLM
@saultube44
@saultube44 5 жыл бұрын
Great video, thanks a bunch, keep up the good work!
@SaulloCarvalho
@SaulloCarvalho 5 жыл бұрын
Awesome video! Thank you.
@unk6822
@unk6822 5 жыл бұрын
That was really interesting not boring! Could you maybe bring up a video on defeating anti debugger tricks from Malware? Because often Malware's main target is to not even be analyzed by a live debugger.
@OALABS
@OALABS 5 жыл бұрын
Thanks for the feedback, we will make more like this in the future for sure. We also have an older (lower quality) vid where we talk about how to defeat some anti-analysis tricks kzbin.info/www/bejne/jZ2oaZSYmJ2JY5Y I'm not sure if that covers everything you are looking for but it's a start.
@xcron0sx
@xcron0sx 4 жыл бұрын
Thx man keep it up! You got a new follower :)
@OALABS
@OALABS 4 жыл бұрын
Thanks : )
@beeb490
@beeb490 3 жыл бұрын
That was very helpful, thanks man :)
@HardyJap
@HardyJap 5 жыл бұрын
Can we have another Windbg tutorial? There is a dearth of Windbg tutorials though everybody in the industry uses it. Would love a follow up to the last Windbg tutorial on this channel.
@OALABS
@OALABS 5 жыл бұрын
Yes this is a great idea and something we have been trying to arrange with Josh for a while. We have just suffered from such a busy schedule that we haven't had a chance to arrange another collaboration. This is definitely going to happen though.
@mmm-me4kk
@mmm-me4kk Жыл бұрын
Great video! Quick question, with a dynamic IAT, do you mean API functions that are called at runtime (so not static DLL imports)?
@OALABS
@OALABS Жыл бұрын
Yes exactly. The imports are resolved dynamically at runtime and called directly.
@ilanisme3698
@ilanisme3698 5 жыл бұрын
love your vids!
@akiraperera9574
@akiraperera9574 2 жыл бұрын
Hi, in the structures part of IDA, is there a way to display all values of one value in a list? Thanks.
@AholicKnight
@AholicKnight 5 жыл бұрын
Hes alive!
@francis2k488
@francis2k488 5 жыл бұрын
Nice video but I was lost. What should be the prerequisite for this knowledge?
@OALABS
@OALABS 5 жыл бұрын
If you scroll down I thing your question is similar to @Do py's. You might be interested in some of the resources Micheal and I recommended to them.
@MrEnsiferum77
@MrEnsiferum77 5 жыл бұрын
I'm not so much in this reversing things, but does is important for the reverse engineer to know what asm code, is actually what data structure? I mean u look at code, and from experience and so on, u detect, oh, this is Binary Tree. What is important to look when u reversing some code?
@tni2667
@tni2667 5 жыл бұрын
what about more "proper" dynamic import implementations where the import resolving is completely inlined and the function pointers are stored on the stack rather than the .data section?=)
@OALABS
@OALABS 5 жыл бұрын
That would be a neat tutorial, but that's pretty rare since it's a lot more work for the malware developer. This sort of block-table import resolving is pretty much the standard unless the malware dev has spent a lot of time on it. The only malware that I know of that does individual import resolving is Dridex and they have their own macros for it. If you send me some hashes of other malware that does this I could maybe make a tutorial out of it?
@alvinye4860
@alvinye4860 5 жыл бұрын
@@BSOD.Enjoyer 牛逼
@dopy8418
@dopy8418 5 жыл бұрын
What would be the starting point ? This is too advanced for me but i find it interesting, i can do cisco networking and python code but is there a book to start in this debugging stuff ?
@Demonslay335
@Demonslay335 5 жыл бұрын
"Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software" is pretty much the industry standard to get started from what I've heard. It's a pretty good read to get some of the basic concepts in your head. Other than that, honestly just jumping in and playing with IDA or a debugger for a bit to get familiar with it a little bit.
@OALABS
@OALABS 5 жыл бұрын
We actually get this question a lot, and if you scroll through the comments of our other videos you will see we have had a few pretty long answers over the years. I agree with what Michael said, that's a good book if you are interested. But if you are like me and you prefer to learn hands on with videos etc. I highly recommend these other channels too: Colin Hardy kzbin.info/door/ND1KVdVt8A580SjdaS4cZg Malware Analysis for Hedgehogs kzbin.info/door/VFXrUwuWxNlm6UNZtBLJ-A Hasherezade kzbin.info/door/NWVswPNgn5kutPNa5sprkg Also for written content I think the Dr. Fu blog is amazing! fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html Good luck! And feel free to drop any questions you have in the chat here.
@OALABS
@OALABS 5 жыл бұрын
Oh also, all this free course work from opensecuritytraining.info/. It's a bit boring since it's just recorded college lectures but if you are looking for a very thorough free resource it can't be beat!
@TheBlackAndWhiteCow
@TheBlackAndWhiteCow 5 жыл бұрын
Good tutorial ,But in practice is there any benefit in static resolving rather than dynamic (just let it run) ?
@OALABS
@OALABS 5 жыл бұрын
That's a great question, and it depends on what you need to do. In most of our tutorials we demonstrate how to quickly triage malware; unpack it and get it ready for reverse engineering. In this tutorial we are starting to show how you begin actually reverse engineering malware. So what's the difference? If you just need to quickly identify the malware and what it does, using the dynamic trick we showed in part 1 of this tutorial will work great and it's nice and fast. However, if you need to report on this malware you may get questions like, how do they resolve their imports, have you seen this import resolving technique used in other malware, is there anything unique we can use to identify this malware by based on the way it resolves imports, etc. These questions can't be answered without fully reversing the malware. That is the main difference between triage, and proper reverse engineering; when you are reverse engineering your are attempting to collect as much information about the binary as possible. At the time of collection you may not understand what is relevant and what is not. There is also a practical benefit to building the IDA scripts which we will demonstrate in the next tutorial. Often when you track the evolution of malware over the course of its life cycle you will have to look at many similar samples. It is much faster to do this type of "bulk" reverse engineering with static scripts rather than having to use a debugger to build the imports each time. Apologies for the long answer but I think this question is very important as it gets at the heart of difference between proper reverse engineering, and triage.
@TheBlackAndWhiteCow
@TheBlackAndWhiteCow 5 жыл бұрын
@@OALABS Thanks for the detailed response didn't even considered the signature aspect.I guess this specific example doesn't demonstrate the benefits of static analysis all too well since as you described the method is well known and reversing the specifics doesn't bring too much new information to the table, of course it's just a tutorial and great one at that. I was using myself IDA Python to find and decrypt salted strings in some sample and it was amazing so I don't look down on static analysis in any way I just avoid it since it usually takes more time (depends on the case). Looking forward for the next video ;)
@b1scoito
@b1scoito 5 жыл бұрын
great video.
@yassinelaptop8286
@yassinelaptop8286 5 жыл бұрын
Thanks man
@inspiredbymichansenpai2393
@inspiredbymichansenpai2393 5 жыл бұрын
can you let us download the video for offline viewing?
@asafcohen3562
@asafcohen3562 5 жыл бұрын
did you pay for ida pro
@OALABS
@OALABS 5 жыл бұрын
Yes I have my own private license 💸💸💸
@ElenFan2011
@ElenFan2011 5 жыл бұрын
@OALabs In your opinion, does one need x64 Hex-Rays decompiler for a malware analysis or is it sufficient to have x86 only?
@asafcohen3562
@asafcohen3562 5 жыл бұрын
@@OALABS that's cool as fuck i just pirate it running through wine or just run ghidra
@Matt-ir1ky
@Matt-ir1ky 5 жыл бұрын
@@asafcohen3562 Bro, OALabs could just crack IDA himself in like 10 mins.
@bob_ross12
@bob_ross12 5 жыл бұрын
thx bob
@supportsupport8156
@supportsupport8156 5 жыл бұрын
comming on KZbin crack IDA PRO licence using GHIDRA😆😆
@OALABS
@OALABS 5 жыл бұрын
😂😂😂😂
@rex_x7028
@rex_x7028 5 жыл бұрын
Hi can you talk with me .? Because I need your help
@OALABS
@OALABS 5 жыл бұрын
Our contact information is on our website.
@rex_x7028
@rex_x7028 5 жыл бұрын
@@OALABS how can I open SPRX files ?
@rex_x7028
@rex_x7028 5 жыл бұрын
@@OALABS to open source
@Useless-Gameplay
@Useless-Gameplay 5 жыл бұрын
Man, you're a god. thanks for this class. by the way, do you have any contact as skype? can we talk?
@OALABS
@OALABS 5 жыл бұрын
Our contact info is on our website : )
@Useless-Gameplay
@Useless-Gameplay 5 жыл бұрын
@@OALABS I was thinking if you can teach how to decompile a program packed with themida. I had some problems doing it
@jundolfarpilleda3628
@jundolfarpilleda3628 5 жыл бұрын
Hi brow could you please help me debug pdf sam enhanced 5,, i have been having difficulty doing it,, thx brahh,,and more power to you
@OALABS
@OALABS 5 жыл бұрын
Sorry we only analyze malware.
@新之助-d8w
@新之助-d8w 5 жыл бұрын
好详细,期待下一集~打算养肥了再看😁
IDA Pro Malware Analysis Tips
1:38:17
OALabs
Рет қаралды 117 М.
1% vs 100% #beatbox #tiktok
01:10
BeatboxJCOP
Рет қаралды 67 МЛН
小丑教训坏蛋 #小丑 #天使 #shorts
00:49
好人小丑
Рет қаралды 54 МЛН
[stream] USB: Reverse Engineering and Writing Drivers
2:39:41
Low Byte Productions
Рет қаралды 94 М.
Reverse Engineering and Weaponizing XP Solitaire (Mini-Course)
2:50:50
jeFF0Falltrades
Рет қаралды 64 М.
Reverse Engineering Malware with IDA: Part 1
55:27
All things IDA
Рет қаралды 2,8 М.
License to Kill: Malware Hunting with the Sysinternals Tools
1:18:10
Mark Russinovich
Рет қаралды 96 М.
Reverse Engineering - Computerphile
19:49
Computerphile
Рет қаралды 187 М.
The BEST Mechanical Display You've EVER Seen!!!
13:51
Tin Foil Hat
Рет қаралды 486 М.
Reverse Engineering 101 tutorial with the amazing Stephen Sims!
1:18:48
1% vs 100% #beatbox #tiktok
01:10
BeatboxJCOP
Рет қаралды 67 МЛН