Great Analysis !!!! Expecting more content from here..
@ahmedskasmani3 жыл бұрын
Thanks a lot for the feedback, means a lot. Planning to create similar content soon.
@chaitanyaghorpade8303 жыл бұрын
Excellent analysis.Please analyse other .net stealers like Agnet Tesla Formbook,etc
@ahmedskasmani3 жыл бұрын
Thank you very much, planning to release similar content in the near future.
@disfiguredloafers3 жыл бұрын
Ditto. Great vid.
@MemesandLeague3 жыл бұрын
I learn a lot from your videos. Do you accept malware samples(or suspected malware samples) to do analysis?
@ahmedskasmani3 жыл бұрын
Hi Harrison, thanks a lot for your comment. I am still learning reverse engineering, I can accept a sample cant promise whether i can answer all questions related to it.
@bdsrahul32482 жыл бұрын
excellent work
@ahmedskasmani2 жыл бұрын
Thanks man
@AbdallahMohamed-py5dz3 жыл бұрын
Keep up the great work
@ahmedskasmani2 жыл бұрын
Thanks a lot 🙂
@yogeshbane96472 жыл бұрын
Good Work. Keep Doing...!! Pls can you do analysis of IcedID malware ?
@ahmedskasmani2 жыл бұрын
Analysis of ICEID Malware Installer DLL kzbin.info/www/bejne/rX67dWeJq5Z0otk
@yogeshbane96472 жыл бұрын
@@ahmedskasmani Thanks a lot..!
@demi17902 жыл бұрын
Hi sir. Can you help me with yoqs ransomware come with redline stealer. I just want to ask some questions. How does this work will they copy the files from the infected pc to c2c before encryption or will they encrypt the files first then after decrypting the files then they will transfer it to the c2c? Hope to hear from you. Thank you.
@madarauch003 жыл бұрын
Sir what does step 1 do ! If victim opens that TXT file he might aware of it