Stealer Malware Analysis Part 2 (Stream - 15/04/2025)
In this stream we continued looking at the Steac C++ variant in Binary Ninja, where we wrote automation to propagate decrypted strings across our database, reverse engineered C++ structures and began analyzing the malware's command-and-control functionality.
Learn how to reverse engineer malware: https://training.invokere.com/course/imbtbn
Notes: https://github.com/Invoke-RE/stream-notes/tree/main/stealc
Twitch: https://www.twitch.tv/InvokeReversing
Twitter: https://twitter.com/InvokeReversing
Mastodon: https://infosec.exchange/@invokereversing
Introduction & Previous Work 00:00
Decrypt String Global Renaming Automation 03:57
Global Import Renaming Automation 19:18
Reverse Engineering Structs 29:34
Analyzing Stealc Functionality 42:06
Wrapping Up 56:18
Видео Stealer Malware Analysis Part 2 (Stream - 15/04/2025) канала Invoke RE
Learn how to reverse engineer malware: https://training.invokere.com/course/imbtbn
Notes: https://github.com/Invoke-RE/stream-notes/tree/main/stealc
Twitch: https://www.twitch.tv/InvokeReversing
Twitter: https://twitter.com/InvokeReversing
Mastodon: https://infosec.exchange/@invokereversing
Introduction & Previous Work 00:00
Decrypt String Global Renaming Automation 03:57
Global Import Renaming Automation 19:18
Reverse Engineering Structs 29:34
Analyzing Stealc Functionality 42:06
Wrapping Up 56:18
Видео Stealer Malware Analysis Part 2 (Stream - 15/04/2025) канала Invoke RE
Комментарии отсутствуют
Информация о видео
23 апреля 2025 г. 16:49:39
00:57:09
Другие видео канала