Dynamically Analyzing Linux Black Basta Ransomware

  Рет қаралды 24,000

LaurieWired

LaurieWired

Күн бұрын

Пікірлер: 78
@miguelmahecha88
@miguelmahecha88 11 ай бұрын
I absolutely love this format. The "window" switching is really cool.
@ktxed
@ktxed 7 ай бұрын
yup, a switch to classic Mac OS. Could use some BeOS love :D
@lkron5741
@lkron5741 Жыл бұрын
This must be one of the most underrated channels on YT.
@thesickestnoodle-nq3wn
@thesickestnoodle-nq3wn Жыл бұрын
I beg to differ she chose the worst ransomware to investigate ever
@VincentGroenewold
@VincentGroenewold 9 ай бұрын
Explain @@thesickestnoodle-nq3wn
@dogyX3
@dogyX3 8 ай бұрын
​@@thesickestnoodle-nq3wn what's wrong with this one?
@thesickestnoodle-nq3wn
@thesickestnoodle-nq3wn 8 ай бұрын
​@@dogyX3It's incredibly simple and featureless... Tons of more fitting samples
@tommyovesen
@tommyovesen 7 ай бұрын
@@thesickestnoodle-nq3wn Come on... I am impressed. Don't be a dick
@randommoosebrains
@randommoosebrains Жыл бұрын
Thanks for uploading. I’m learning a lot of cool stuff from the channel. Haven’t seen all the videos but thank the algorithm for the recommending this channel.
@samrichardson9827
@samrichardson9827 7 ай бұрын
The fact that you can analyze, decypher, plan ahead and slow yourself down for us, in order to perform this perfectly clear pedagogic explanation, all at once, is kinda impressive.
@djukicdev
@djukicdev Жыл бұрын
Let's all love lain
@mytechnotalent
@mytechnotalent Жыл бұрын
Great job Laurie! I love how strace can show so much. In a CTF I wrote in x86 Assembler, I worked to hide all of the traces but few ever go to such lengths.
@tolkienfan1972
@tolkienfan1972 8 ай бұрын
strace traces syscalls. No way to read or write files under Linux without syscalls, even in assembly.
@zt9233
@zt9233 3 ай бұрын
Yea I’m wondering how it would even be possible to hide
@QLPJosh
@QLPJosh 6 ай бұрын
This was a great watch, really interesting stuff. Thank you for creating this
@MaZderMind
@MaZderMind Жыл бұрын
Kudos to the amount of work you put into the production! The MacOS/WinXP crossover made me lough and love to the Corgi :) Also, you have a really calm and structured way of teaching. 👌
@ismiregalichkochdasjetztso3232
@ismiregalichkochdasjetztso3232 8 ай бұрын
I started my reverse engineering career as a teen in the late 80s, mostly cracking games and hunting malware on MS-DOS. Glad to see the next generation going strong at it!
@kumarprateek1279
@kumarprateek1279 Жыл бұрын
Thanks for these videos. It has really got me interested in malware analysis.
@math4538
@math4538 Жыл бұрын
Excellente vidéo, merci pour ce contenu
@envygrace
@envygrace Жыл бұрын
Very interesting, love your channel
@szymoniak75
@szymoniak75 8 ай бұрын
typical Linux experience: you even have to troubleshot malware and actually try hard to get it working
@Kristopher_Logan
@Kristopher_Logan 5 ай бұрын
Actually, her experience was due to the fact she was not running Virtual Machine hardware in a certain configuration. A mere change to a path can result in the ransomware not working.
@mojed6666
@mojed6666 Жыл бұрын
This women has great style :-) and so cool how she explains stuff. Thanks
@peterweston6588
@peterweston6588 4 ай бұрын
"Present Day, Present Time -- Copland OS"
@satina1169
@satina1169 Жыл бұрын
The world needs more Lauries
@emileberteloot6546
@emileberteloot6546 Жыл бұрын
Pure Gold ! Pls never stop !
@IsaiahG-em9in
@IsaiahG-em9in Жыл бұрын
I love your videos! I learn so much!! Thank you
@danielranc8963
@danielranc8963 8 ай бұрын
Nice exercice! Note that this malware must first acquire root privileges to do anything ugly.
@0xeb-
@0xeb- Жыл бұрын
Good work Laurie.
@kikomartinez9062
@kikomartinez9062 5 ай бұрын
Ok you had ne at the Lain intro lol subscribed
@marcschweiz
@marcschweiz 11 ай бұрын
Great content!
@afkbender3686
@afkbender3686 Жыл бұрын
awesome and way above my head! ::Swoosh::
@LeonIsAPro
@LeonIsAPro 9 ай бұрын
Thanks, I leaned so much. I agree withlkron5741, this channel is very underrated.
@RyouConcord
@RyouConcord Жыл бұрын
ty for the upload!
@berndeckenfels
@berndeckenfels 4 ай бұрын
So the decryptor is from the ransom group and does decrypt anything without payment or is it a third party crack?
@dripcode2600
@dripcode2600 9 ай бұрын
Fun! Informative! Really enjoy your videos! #LaurieWired
@pavloburyanov5842
@pavloburyanov5842 7 ай бұрын
container inside vm inside vm. lets go!
@lewiswhitling1351
@lewiswhitling1351 9 ай бұрын
I'm so confused... it encrypted to a length of bytes that you'd probably expect. Which then decrypted to a small number of bytes (about the size of a key). Which then encrypted back to a length similar to the original encryption. Which then decrypted back to the original bytes. I've never come across anything like that before... wouldn't the initial decryption that shortened the bytes lose information? Is this multiple encrypt/decrypt a common method in cyber-sec land?
@MichaelButlerC
@MichaelButlerC 8 ай бұрын
it's really weird for sure... but after the first "Decrypt" the length could also be similar to the "hello world" text itself, so maybe it converted it to something close to the original bytes, but maybe NOT'd or something. Then when you Encrypt again, and Decrypt again, you get another NOT inverse which results in the original text. I'm actually more interested how it really is doing the encryption, what key it is using. if they really wanted the client not to be able to recover it they would generate a random encryption key on the fly and then send it back to the "mothership". but I guess that leads to too many potential problems so it's not worth it -- better to make a pseudo security theater encryption/decryption for the best chances of getting paid.
@rich1051414
@rich1051414 7 ай бұрын
​@@MichaelButlerC It's perhaps a XOR pass or something else that masks the data in a reversible way? If it's XOR'ed with the key, it would make it more difficult to break, as the decrypted data wouldn't actually match the encrypted data in a predictable way?
@NineInchTyrone
@NineInchTyrone 6 ай бұрын
How about a roadmap for learning these techniques
@zt9233
@zt9233 3 ай бұрын
That would be great
@ktxed
@ktxed 7 ай бұрын
What theme is Laurie using for the XP feeling?
@its1one
@its1one Жыл бұрын
That's awesome
@FitzkeeLab
@FitzkeeLab Жыл бұрын
It doesn't appear that the ransomware is actually "stealing" the data and transferring it to another server. Wouldn't you see that in the strace? Or am I misunderstanding how this malware works?
@MartinWoad
@MartinWoad 11 ай бұрын
My guess is that the authors are bluffing with the data being stoled, but obviously not with the encryption part. They have probably crafted versions of this malware based on the targeted company and when paid ransom would reveal the decryption key based on the company id of the target (or they wouldn't share it at all). I was looking for the malware attempting to detect network interfaces as based on the fact that this container is isolated it would not be able to do much and cease further attempts, but I did not see any syscalls that would indicate it.
@MichaelButlerC
@MichaelButlerC 8 ай бұрын
@@MartinWoadand also, looks like the "decryption" part didn't even require any decryption key input, so it was most likely all "built-in" to both binaries (probably to reduce risk of failure, which leads to failure in getting paid).
@illteteka
@illteteka Жыл бұрын
What keyboard are you using? I love the sound of it
@antonadjei
@antonadjei Жыл бұрын
perhaps a mechanical keyboard with customized switches.. I love the sound of it too
@ronaldjonson8240
@ronaldjonson8240 Жыл бұрын
Saw the lain intro and hit subscribe immediately
@PurpleTeamer
@PurpleTeamer Жыл бұрын
Hi Laurie. Stupid question, but the Ubuntu VM you are using is 64bit or 32bit ? just asking. Thank you Great Video BTW
@atatopatato
@atatopatato Ай бұрын
Actually its a great question.
@tolkienfan1972
@tolkienfan1972 8 ай бұрын
Weird that it took an extra encrypt+decrypt to get back to the original
@Павал-л8ч
@Павал-л8ч 8 ай бұрын
Probably a mistake of malware writers. I have seen a case when some ransomware encrypted all files with the same kay and IV, so if you happen to have an original file of one of the encrypted files, you just needed to xor them, and then xor the result with all other files to decrypt them (except ones that are longer, obviously). It would be nice to find out how it really works and understand why it happens.
@nicholaslandolina
@nicholaslandolina 6 ай бұрын
The old TV
@kayleekayt3306
@kayleekayt3306 29 күн бұрын
Me wondering whether the windows desktop is a techbro trap oO
@goonman1255
@goonman1255 Жыл бұрын
what OS is that?
@quackcharge
@quackcharge Жыл бұрын
win11
@gurpchirp
@gurpchirp Ай бұрын
she's so adorable.
@GEORGECAR4
@GEORGECAR4 Жыл бұрын
Hi Laurie great video do you mind making a video of putting black Basta into ghidra I'm currently trying to analyze a windows version the one that starts with ae7 an I'm completely lost in ghidra
@mashraf7858
@mashraf7858 Жыл бұрын
These thumbnails though 😂
@btruj2507
@btruj2507 7 ай бұрын
Looks like it targets VMware O/S
@quicktastic
@quicktastic 7 ай бұрын
Jimmy 'two-times' from GoodFellas would've cracked this. "I'm gonna get the papers. Get the papers". "I'm gonna decrypt the files. Decrypt the files".
@AndrewKroll
@AndrewKroll Жыл бұрын
Well, strace doesn't tell you much, just traces system calls. You should use gdb and/or a disassembler instead to figure out how the actual encryption works.
@wuggyfoot
@wuggyfoot 3 ай бұрын
she kinda sound like oyung sheldon
@Tiredofkiling
@Tiredofkiling Жыл бұрын
Schway
@NineInchTyrone
@NineInchTyrone 6 ай бұрын
WRITE A BOOK
@JamesSmith-ix5jd
@JamesSmith-ix5jd Жыл бұрын
похоже это настоящая девушка, не транс, фембой или актёрша не понимающая что читает с телесуфлёра...
@rolandcollins1427
@rolandcollins1427 Жыл бұрын
i am sorry !what! thankyou
@anderson-gb8rp
@anderson-gb8rp Жыл бұрын
How's chad?
What ACTUALLY happens during a Stack Overflow?
12:43
LaurieWired
Рет қаралды 148 М.
A Competition for Unreadable Code?
12:33
LaurieWired
Рет қаралды 168 М.
ТЮРЕМЩИК В БОКСЕ! #shorts
00:58
HARD_MMA
Рет қаралды 2,7 МЛН
How many people are in the changing room? #devil #lilith #funny #shorts
00:39
Чистка воды совком от денег
00:32
FD Vasya
Рет қаралды 2,9 МЛН
Linux vs Windows: Malware
6:57
The PC Security Channel
Рет қаралды 249 М.
Ransomware Is An Epidemic And It's Getting Worse | Cryptoland
24:19
Cybersecurity "Experts" suck at coding.  It's a problem.
15:12
LaurieWired
Рет қаралды 122 М.
Wana Decrypt0r (Wanacry Ransomware) - Computerphile
15:19
Computerphile
Рет қаралды 1,5 МЛН
Reverse Engineering 101: How to Dissect and Master Any Platform
18:21
Mastering Memory: Allocation Techniques in C, C++, and ARM Assembly
17:05
revealing the features of the XZ backdoor
9:29
Low Level
Рет қаралды 284 М.
Deciphering Obfuscated JavaScript Malware
31:12
LaurieWired
Рет қаралды 82 М.
Become a shell wizard in ~12 mins
12:25
CODE IS EVERYTHING
Рет қаралды 260 М.
ТЮРЕМЩИК В БОКСЕ! #shorts
00:58
HARD_MMA
Рет қаралды 2,7 МЛН