MALWARE ANALYSIS | Reversing IDAT (Hijack) Loader / Injector using x32dbg, Ghidra, and IDA

  Рет қаралды 1,871

Jai Minton - CyberRaiju

Jai Minton - CyberRaiju

Күн бұрын

Пікірлер: 6
@chathurangaonnet
@chathurangaonnet 6 ай бұрын
Literally I feel lost. Don't understand anything ! but keep trying watch this again and again. I like it. Also Love your memes they are so cool and as always ♥
@hectormorenocampo
@hectormorenocampo 6 ай бұрын
awesome!
@ownagesbot54
@ownagesbot54 Ай бұрын
@ 12:00 is it just me or does this shellcode look like ScyllaHide's code?
@cyberraiju
@cyberraiju Ай бұрын
Yeah you're correct. I previously updated the video description to mention my oversight there. "Note: In the video I call out a section at 11:14 around the string 'malware called ResumeThread' this is actually part of the Hooked functions library of ScyllaHide an anti-anti-debug library and not the malware itself. This is an oversight on my behalf."
@ownagesbot54
@ownagesbot54 Ай бұрын
@@cyberraiju Sorry, hadn't noticed that, and wasn't a criticism - I'm working on something similar and had found the same shell code/strings and wanted some confirmation that I was understanding things correctly. Thank you for your videos, been very helpful to me.
@cyberraiju
@cyberraiju Ай бұрын
@ownagesbot54 ahh no worries at all, apologies if my previous comment came across blunt 😌 Thanks for the kind words! Super glad they have been helpful, and wishing you the best with your analysis 🙏
When u fight over the armrest
00:41
Adam W
Рет қаралды 31 МЛН
За кого болели?😂
00:18
МЯТНАЯ ФАНТА
Рет қаралды 3,1 МЛН
What type of pedestrian are you?😄 #tiktok #elsarca
00:28
Elsa Arca
Рет қаралды 33 МЛН
Stream NDI to Callaba Video Calls
1:47
Callaba
Рет қаралды 3
Anti Reverse Engineering | How Hackers Make Malware Undetectable & Difficult to Analyze | TryHackMe
35:49
This ANTIVIRUS runs MALWARE | Malware Analysis Lab (IDAT Loader Part 1)
10:43
Jai Minton - CyberRaiju
Рет қаралды 1,4 М.
IDA 9.0 Features and Syscall Malware Analysis (Stream - 2/11/2024)
2:03:42
Reverse Engineering and Weaponizing XP Solitaire (Mini-Course)
2:50:50
jeFF0Falltrades
Рет қаралды 62 М.
HTA JScript to PowerShell - Novter Malware Analysis
1:24:19
John Hammond
Рет қаралды 96 М.
Static and Dynamic MALWARE ANALYSIS | Agent Tesla from an AutoIT EXE
14:24
Jai Minton - CyberRaiju
Рет қаралды 1,2 М.
What are TLS Callbacks and How to Find Them!
17:26
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 1,5 М.
IDA Pro Malware Analysis Tips
1:38:17
OALabs
Рет қаралды 117 М.
When u fight over the armrest
00:41
Adam W
Рет қаралды 31 МЛН