Live Stream - Finding Emotet's Config
Today I take you through a method to unpack and reveal Emotet's C2 config, enabling you to access many more network IOCs than you may initially observe in your behavioural analysis.
The samples I used in the demo are:
https://any.run/report/b1cad1540ecb290088252635f8e130022eed7486eb128c0ca3d676945d60a9fc/64a8cd9e-3130-41b5-ac48-41182dd22f26
https://any.run/report/45b3a138f08570ca324abd24b4cc18fc7671a6b064817670f4c85c12cfc1218f/9f48ce94-2b6a-4046-8bf5-2aa68145490e
The script I used to dump the config can be found here:
https://github.com/cybercdh/hacks/tree/master/emotet
If you liked the video, hit the thumbs up. If you loved it, please subscribe.
Find Me:
https://twitter.com/cybercdh
https://colin.guru
Thanks!
Colin
Видео Live Stream - Finding Emotet's Config канала Colin Hardy
The samples I used in the demo are:
https://any.run/report/b1cad1540ecb290088252635f8e130022eed7486eb128c0ca3d676945d60a9fc/64a8cd9e-3130-41b5-ac48-41182dd22f26
https://any.run/report/45b3a138f08570ca324abd24b4cc18fc7671a6b064817670f4c85c12cfc1218f/9f48ce94-2b6a-4046-8bf5-2aa68145490e
The script I used to dump the config can be found here:
https://github.com/cybercdh/hacks/tree/master/emotet
If you liked the video, hit the thumbs up. If you loved it, please subscribe.
Find Me:
https://twitter.com/cybercdh
https://colin.guru
Thanks!
Colin
Видео Live Stream - Finding Emotet's Config канала Colin Hardy
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![](https://i.ytimg.com/vi/Xv3wKXtnE0I/default.jpg)
![Emotet JavaScript dropper deobfuscation and analysis](https://i.ytimg.com/vi/13rX3cLUHhU/default.jpg)
![Y2K22 - Why 2022 Broke Email](https://i.ytimg.com/vi/3zkpM6szWHM/default.jpg)
![I bought a PHISHING website from the DARKWEB. Here's what I found...](https://i.ytimg.com/vi/SMKHIPEcKx8/default.jpg)
![Emotet is Dead](https://i.ytimg.com/vi/qKrfqasbWrg/default.jpg)
![Oldest Technologies Scientists Still Can't Explain](https://i.ytimg.com/vi/QeajYcltm5c/default.jpg)
![The Scandinavian Hygge Lifestyle Taking The World By Storm](https://i.ytimg.com/vi/Pl74ybpyNLk/default.jpg)
![CVE-2017-8570 - Dynamic analysis of Exploit used in Powerpoint to deliver KeyBase InfoStealer](https://i.ytimg.com/vi/5JQEmr7_Cus/default.jpg)
![Extract Shellcode from Fileless Malware like a Pro](https://i.ytimg.com/vi/jbieGfML0Bs/default.jpg)
![Free Energy Using Speaker Magnet Technology For 2019](https://i.ytimg.com/vi/T52cEofR8WI/default.jpg)
![Quick Behavioural Analysis of NotPetya / Petrwrap Ransomware](https://i.ytimg.com/vi/vtDgA_aasfc/default.jpg)
![SUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse Engineering](https://i.ytimg.com/vi/JoMwrkijTZ8/default.jpg)
![How to STEAL $1bn - A look at the Bangladesh Bank Heist](https://i.ytimg.com/vi/hQH7gF5FAxY/default.jpg)
![CVE-2017-11882 - 3 ways to perform technical analysis, 1 easy way to protect](https://i.ytimg.com/vi/aBWAHxpXHEk/default.jpg)
![Y2K22 Bug Stopped Emails Exchange Service Anti-Malware Service Impacted 2022](https://i.ytimg.com/vi/2Kt63uu3cww/default.jpg)
![Zyxel Backdoor & A Known Plaintext Attack](https://i.ytimg.com/vi/2lVAOII3q_k/default.jpg)
![NSO Pegasus Malware - How Governments spy on any phone](https://i.ytimg.com/vi/LfC0iIR7szs/default.jpg)
![Olympic Destroyer - Quick behavioural Analysis of this Wiper Malware](https://i.ytimg.com/vi/GkSJn8sGAKw/default.jpg)
![Kaseya Ransomware Attack - 5 Key Insights into this Malware campaign](https://i.ytimg.com/vi/NseGdvoEbbY/default.jpg)
![The Truth About Phishing - Tools, Tactics and Techniques to Analyse Phishing & Protect Your Privacy](https://i.ytimg.com/vi/HwozWl77f3A/default.jpg)