WannaCry 2.0 Ransomware
A very quick behavioural analysis of WannaCry / wanacry 2.0 / wanacrypt0r ransomware. Filmed in one take with a view to show how to really quickly analyse a sample, dump some network indicator strings and show the persistence mechanisms of the sample. MD5 84c82835a5d21bbcf75a61706d8ab549
IOCs from this campaign can be found here: https://pastebin.com/2TTCcvQV
Also note that there are many samples in the wild with varying indicators. The IPs in this sample are therefore not an exhaustive list of all you need to monitor / block etc. Some good information being pulled together is also stored here: https://gist.github.com/rain-1/989428fa5504f378b993ee6efbc0b168
Видео WannaCry 2.0 Ransomware канала Colin Hardy
IOCs from this campaign can be found here: https://pastebin.com/2TTCcvQV
Also note that there are many samples in the wild with varying indicators. The IPs in this sample are therefore not an exhaustive list of all you need to monitor / block etc. Some good information being pulled together is also stored here: https://gist.github.com/rain-1/989428fa5504f378b993ee6efbc0b168
Видео WannaCry 2.0 Ransomware канала Colin Hardy
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Running an SQL Injection Attack - ComputerphileWannaCry Ransomware - Revisited. Behavioural and Static Analysis TechniquesWana Decrypt0r (Wanacry Ransomware) - ComputerphileAnalysing a Firefox Malware browserassist.dll - FLARE-On 2018WannaCry 2.0 - Three ways to find the Kill SwitchReversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #GhidraWriting Viruses for Fun, not ProfitInfoshare 2017: Piotr Konieczny (niebezpiecznik.pl) – WannaCry - 250 tysięcy ofiar ze 150 krajówPlaying with WannaCry RansomwareHow easy is it to capture data on public free Wi-Fi? - Gary explainsOvercome Self-Defending Malware - Tools, Techniques and Lab SetupAnalysing Obfuscated VBA - Extracting indicators from a Trickbot downloaderKaspersky vs RansomwareBreaking The Kill Chain: A Defensive ApproachZyxel Backdoor & A Known Plaintext AttackLangner's Stuxnet Deep DiveQuick Behavioural Analysis of NotPetya / Petrwrap RansomwareReversing WannaCry Part 2 - Diving into the malware with #GhidraDEMO: The Anatomy of RansomwareSUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse Engineering