Emotet Malware Analysis - Part 1 - Deobfuscating VBS code
In this and the next video we'll analyse a sample from the popular Emotet malware. Very well-known by now, with its own Wikipedia page. Very proud to get to look at it!
⚔️ Part 0x01 - Deobfuscate the VBS layer
---------------------------------------------------------------------------------------------------
Follow us on Twitter : https://twitter.com/reversinghub
Github : https://github.com/reversinghub
If you liked this video and you want to learn hands-on how to analyse malware threats, with real samples and practical exercises, find us on Udemy :
https://www.udemy.com/course/reverse-engineering-essentials/?referralCode=D738F461C93A2CD029FB
---------------------------------------------------------------------------------------------------
Want to support us continue to make great content? Buy us a coffee :
https://ko-fi.com/reversinghub
Thank you 🙏
Видео Emotet Malware Analysis - Part 1 - Deobfuscating VBS code канала Reversing Hub
⚔️ Part 0x01 - Deobfuscate the VBS layer
---------------------------------------------------------------------------------------------------
Follow us on Twitter : https://twitter.com/reversinghub
Github : https://github.com/reversinghub
If you liked this video and you want to learn hands-on how to analyse malware threats, with real samples and practical exercises, find us on Udemy :
https://www.udemy.com/course/reverse-engineering-essentials/?referralCode=D738F461C93A2CD029FB
---------------------------------------------------------------------------------------------------
Want to support us continue to make great content? Buy us a coffee :
https://ko-fi.com/reversinghub
Thank you 🙏
Видео Emotet Malware Analysis - Part 1 - Deobfuscating VBS code канала Reversing Hub
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![RxSwift Beginners Episode 6 - RxDataSources](https://i.ytimg.com/vi/HpdNeA88fzA/default.jpg)
![Process hollowing and Microsoft Defender detection](https://i.ytimg.com/vi/1LLgR5--y5k/default.jpg)
![GCC Code Obfuscation Plugins GOAT - Part 3 (JPanic GCC 9.3)](https://i.ytimg.com/vi/9LnOqXn0pk8/default.jpg)
![Metasploit Deep Dive - Part 0x08 - Bypass Defender AV](https://i.ytimg.com/vi/xKJ5i5FKQeU/default.jpg)
![AutoIt process injection with shellcode and PE files](https://i.ytimg.com/vi/tBDolrwd79M/default.jpg)
![Three ways to solve the MOVfuscator crackme](https://i.ytimg.com/vi/50fmWUHn9dY/default.jpg)
![Windows DLL Injection via AppInit_DLLs - Part 3](https://i.ytimg.com/vi/RTbfPvMsvSw/default.jpg)
![How to Detect and Debug Memory Leaks](https://i.ytimg.com/vi/BaQ3RmLVUiA/default.jpg)
![Swift Name Mangling - Part 1 - Name decoration](https://i.ytimg.com/vi/QXQ89mVb02s/default.jpg)
![Metasploit Deep Dive - Part 0x05 - Anti-Debugging](https://i.ytimg.com/vi/1gtb8SGS7ww/default.jpg)
![Swift Name Mangling - Part 2 - De-mangling](https://i.ytimg.com/vi/wRUDZi_XGmI/default.jpg)
![Fun with machO x86-64 shellcode (Part 1)](https://i.ytimg.com/vi/o8SQk0IH_x0/default.jpg)
![Metasploit Deep Dive - Part 0x01 - Overview](https://i.ytimg.com/vi/R5V7bmJK3Fw/default.jpg)
![How to create a MOVfuscated reverse shell](https://i.ytimg.com/vi/0JOMxbEDhb4/default.jpg)
![Stack Smashing Protection - Part 3 - Deep Dive and Edge Cases](https://i.ytimg.com/vi/Ch4QSL6hg8s/default.jpg)
![Metasploit Deep Dive - Part 0x09 - Payload Binder](https://i.ytimg.com/vi/dl2pHT1I5vA/default.jpg)
![Metasploit Deep Dive - Part 0x04 - Find-by-hash (static)](https://i.ytimg.com/vi/T_mTcoRvJ5E/default.jpg)
![Bypass anti-ransomware protection in Defender Antivirus](https://i.ytimg.com/vi/714_zpUQx0A/default.jpg)
![Reverse Engineering - Detect Process Injection - Part 4](https://i.ytimg.com/vi/U2QVyaufWV4/default.jpg)
![Stack Smashing Protection - Part 1 - Disassembly](https://i.ytimg.com/vi/cjEIxGOmPno/default.jpg)
![Function Interposing](https://i.ytimg.com/vi/DDWmwnqU6PA/default.jpg)