Reversing Malicious Office Document (Macro) Emotet(?)

  Рет қаралды 36,774

IppSec

IppSec

Күн бұрын

Пікірлер: 62
@sagik362
@sagik362 5 жыл бұрын
Absolutely useful and well made video ! these type of analysis are super important to learn , would love to see more of these in the future :-) Thanks a ton.
@pnphtc7178
@pnphtc7178 7 жыл бұрын
You make everything seem so easy and simple! Best security youtube channel!
@TheDarkHorseUprising
@TheDarkHorseUprising 7 жыл бұрын
This video was great :) I actually prefer this to the CTF videos, plz make more like this :)
@flawlesscode6471
@flawlesscode6471 4 жыл бұрын
@@handan4828 we wont help you create malware
@flawlesscode6471
@flawlesscode6471 4 жыл бұрын
@@handan4828 why are you suddenly so triggered
@flawlesscode6471
@flawlesscode6471 4 жыл бұрын
​@@handan4828 i can create malware. but i dont like to do malware, because i can use my capabilitys to create safer software
@flawlesscode6471
@flawlesscode6471 4 жыл бұрын
@@handan4828 and dont ask me to prove it, because i wont
@flawlesscode6471
@flawlesscode6471 4 жыл бұрын
@@handan4828 if you ask someone how find/exploit a software/system you will get that answer. and insulting someone has never helped. i think your mature enough to discuss without insulting.
@1emvr
@1emvr Жыл бұрын
You should totally do more off-topic things like this
@manoharbaratam8792
@manoharbaratam8792 2 жыл бұрын
Such a brilliant explaination.🤩 Very useful
@elikelik3574
@elikelik3574 4 жыл бұрын
Thanks a looooooot. So useful video. I watched it 2 times and noted a lot of new technics. Please do more videos like this. Peace.
@ranjithdoosa
@ranjithdoosa 4 жыл бұрын
This vedio was awesome and more informative. We do expecting same kind of stuff.
@TalkL3ss
@TalkL3ss 4 жыл бұрын
Ippsec I love your CTF videos, but why didn't you base64 decode the palyload, and then do some strings on the files, and stay over the static analysis? And at the end move to dynamic
@RowanSheridan
@RowanSheridan 7 жыл бұрын
I really appreciate your videos. Very insightful to understand your thought process
@addliam
@addliam 2 жыл бұрын
Great content!. I'd like to see a malware executable analysis
@michaelk8642
@michaelk8642 3 жыл бұрын
That was really interesting. Thanks for making this video.
@dom252
@dom252 4 жыл бұрын
Is there info on how to create this kind of networking setup in vmware/virtualbox anywhere?
@icksdeh
@icksdeh 4 жыл бұрын
you can just install fiddler in your VM, does the job :) see www.telerik.com/fiddler
@-BANKAI-n1
@-BANKAI-n1 7 жыл бұрын
Hello Ippsec. Can you make a sequel of this video in which the .docx file is password protected and the vba script is preventing password removal and viewing of the macros code? I usually use sandboxie with buster to analyse these, but curious to see what your approach is.
@ippsec
@ippsec 7 жыл бұрын
I've never had that scenario nor a document to play with, so can't really do that sorry.
@flawlesscode6471
@flawlesscode6471 4 жыл бұрын
hey. sorry for being late. if you can trust the documentation, the macro source is not encrypted - only the document it self is. -> MS Office files encrypted with a password are also supported, because VBA macro code is never encrypted, only the content of the document.
@timothyalvarado5315
@timothyalvarado5315 6 жыл бұрын
I have malware on my iPhone and Computer don’t know how to Get rid of it.. I hear random phone dials when I talk on the phone and my computer is weird glitchy just like my phone it flashes when I close or open random apps any help?? I just got a macros malware when I open my Microsoft Word sucks man so easy to tell I have malware but so hard to get rid off...
@emlincharly
@emlincharly 4 жыл бұрын
Awesome video! Do you have Base64 Decode in Notepad++?
@ROBERT-ml7ml
@ROBERT-ml7ml 5 жыл бұрын
You should run burp suit in the background for http history
@satheshname8983
@satheshname8983 4 жыл бұрын
My laptop and mobile is effected with spyware how can i gather info about the attackers to get them to law
@rabbit_holed
@rabbit_holed 7 жыл бұрын
Currently building a bro lab with ELK stack for dynamic analysis. Would love to see some bro!
@notme1581
@notme1581 5 жыл бұрын
What VM software are you using?
@justaguy3158
@justaguy3158 7 жыл бұрын
Very helpful video.. I hope you continue uploading videos like this.. thank you so very much.
@FunctionSys1
@FunctionSys1 5 жыл бұрын
Awesome! Could you please demonstrate how to use oledump tool to extract attachment from .msg files OLE? and view macro code!
@alex_94-r2g
@alex_94-r2g 5 жыл бұрын
this is awesome is the malware analisis using Bro video uploaded yet .. i would like to see that thanks
@ir4640
@ir4640 4 жыл бұрын
How do you setup your ubuntu router
@SxMT
@SxMT 5 жыл бұрын
Awesome video! I'd love to try thing like this so please keep the tips on how to do it safely coming! Whats your take on Windows Sandbox?
@testingx01
@testingx01 7 жыл бұрын
Do you have any walkthrough of picoctf?
@JF-di5el
@JF-di5el 4 жыл бұрын
Are you John Hammond? Your voice the same with John Hammond:)
@ffucckkyoutube5765
@ffucckkyoutube5765 5 жыл бұрын
will the docx file infect or execute the malware if I run a linux ubuntu with openoffice?
@edgydubsteplorde7628
@edgydubsteplorde7628 4 жыл бұрын
No
@tw3t3
@tw3t3 7 жыл бұрын
Cool videowriteup =) Conduct further investigation of that malware. Subscribers are waiting xD Could you drop reference to malicious document itself and .exe ? I'd like to repeat what you did and examine PE further with IDA and dynamic analysis.
@ippsec
@ippsec 7 жыл бұрын
The URLS that host the malicious executable are in the video and not a pain to type. Try going there to download it. I really don't want to put malware in a public space, even if I zipped it up with a simple pw.
@omkarbhat4922
@omkarbhat4922 5 жыл бұрын
Hey! how can I get that word document so that I can try this for myself.
@ippsec
@ippsec 5 жыл бұрын
Your best bet is to google around for malicious documents to try - I don’t have it anymore and didn’t upload anywhere because it was legitimate malware and i didn’t want to distribute it
@namik2b
@namik2b 6 жыл бұрын
Great video, very useful!
@mvrk3755
@mvrk3755 7 жыл бұрын
Awesome video man.
@amongus78966
@amongus78966 2 жыл бұрын
The first time I see that someone dared to run Emotet
@oslaf3323
@oslaf3323 5 жыл бұрын
Thanks man, really interesting!
@DEF3NDME
@DEF3NDME Жыл бұрын
Thank you sir.
@mirocotech2132
@mirocotech2132 7 жыл бұрын
You should do this on other viruses
@buestrm2841
@buestrm2841 5 жыл бұрын
Current spike in emotets brought me here! 😁
@ganeshkumargopinathan6375
@ganeshkumargopinathan6375 7 жыл бұрын
Awesome video!!!
@neoXXquick
@neoXXquick 7 жыл бұрын
Amazing stuff.. thx for sharing..
@justforyoutube1319
@justforyoutube1319 5 жыл бұрын
you're elite !
@blevenzon
@blevenzon 7 жыл бұрын
Please make more!!!
@0xfrijolito
@0xfrijolito 3 жыл бұрын
rip emotet :c
@TyrellJoanna
@TyrellJoanna 3 жыл бұрын
🤪
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
42:23
John Hammond
Рет қаралды 1 МЛН
The King Of Malware is Back
19:27
John Hammond
Рет қаралды 192 М.
Tuna 🍣 ​⁠@patrickzeinali ​⁠@ChefRush
00:48
albert_cancook
Рет қаралды 148 МЛН
The Best Band 😅 #toshleh #viralshort
00:11
Toshleh
Рет қаралды 22 МЛН
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 19 МЛН
EMOTET - Interactive Malware Analysis with ANY.RUN
15:30
Hack eXPlorer
Рет қаралды 21 М.
Five Awesome Tools to perform Behavioural Analysis of Malware
15:18
What's inside a .EXE File?
8:27
Inkbox
Рет қаралды 439 М.
HackTheBox - CronOS
28:50
IppSec
Рет қаралды 75 М.
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
24:16
#2 How To Analyse a Malicious Word Document
21:54
Neil Fox
Рет қаралды 24 М.
Crafting Malicious MS Word to Execute Reverse Shell (Macro)
4:39
Tuna 🍣 ​⁠@patrickzeinali ​⁠@ChefRush
00:48
albert_cancook
Рет қаралды 148 МЛН