Live Stream - Part 1 - Emotet Downloader Analysis
My First Live Stream!!
Apologies for the low-quality, this was resolved in Part 2, so check that out.
Here I take you through some tips and tricks to extract key Indicators of Compromise (IOCs) from Word Doc's designed to deliver Emotet malware.
Hope you found it fun, if you like the video please give it the thumbs up, if you loved it then please subscribe!
Follow me on https://twitter.com/cybercdh
Samples:
MD5 (emotet_jse.doc) = 8ccbe39e1fcead257284e55753c18799
MD5 (emotet_ps.doc) = 406195489b8919c93db1bdb93b464390
Thanks!
Colin
Видео Live Stream - Part 1 - Emotet Downloader Analysis канала cybercdh
Apologies for the low-quality, this was resolved in Part 2, so check that out.
Here I take you through some tips and tricks to extract key Indicators of Compromise (IOCs) from Word Doc's designed to deliver Emotet malware.
Hope you found it fun, if you like the video please give it the thumbs up, if you loved it then please subscribe!
Follow me on https://twitter.com/cybercdh
Samples:
MD5 (emotet_jse.doc) = 8ccbe39e1fcead257284e55753c18799
MD5 (emotet_ps.doc) = 406195489b8919c93db1bdb93b464390
Thanks!
Colin
Видео Live Stream - Part 1 - Emotet Downloader Analysis канала cybercdh
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
If Amber Heard did InfoSecDetect, Hunt & Analyze Threats with INTEZERY2K22 - Why 2022 Broke EmailLOG4SHELL - A Zero Day you need to protect against TODAYWas it Really North Korea? Tools and Techniques to Attribute Malware Campaigns to Nation StatesNSO Pegasus Malware - How Governments spy on any phoneKaseya Ransomware Attack - 5 Key Insights into this Malware campaignJavaScript Malware - How bad can it be?Clubhouse Malware - Analysis of an Agent Tesla Infection CampaignHow to STEAL $1bn - A look at the Bangladesh Bank HeistI bought a PHISHING website from the DARKWEB. Here's what I found...25000 SUBSCRIBERS! A look back and forwards across the channel and my THANKS to YOU!!!!!Cyber Defender REACTS to THEFT of Microsoft Exchange Server ZERO DAYS used by HAFNIUMRemcos Config - Using RC4 to Get Command & Control from CyberChefBuilding a Malware Lab - Software, Hardware, Tools and Tips for Effective Malware AnalysisEmotet is DeadJNLP Dangers - Java Malware Detection & AnalysisThe Truth About Phishing - Tools, Tactics and Techniques to Analyse Phishing & Protect Your PrivacyZyxel Backdoor & A Known Plaintext AttackSUPERNOVA - Everything you need to know to Reverse Engineer an APT WebShellSUNBURST SolarWinds RECON - Malware Reverse Engineering, OSINT and Identifying Victims