Malware Analysis | Obfuscated PowerShell Dropper (Part 1)
========= LINKS =========
Twitter: https://twitter.com/kindredsec
Patreon: https://www.patreon.com/kindredsec
Twitch: https://www.twitch.tv/kindredsec
Discord: https://discord.gg/CCZCJCu
GitHub: https://github.com/itsKindred
========= DESCRIPTION=========
In this video, we breakdown an obfuscated PowerShell dropper that pulls a malicious binary off of compromised websites. We will breakdown the actual PowerShell dropper, then do some light dynamic analysis on the binary that the dropper grabs. There will be a part 2 of this video, where we will do some reversing on the binary itself to determine what activity the malware is capable of.
DISCLAIMER: Please do not mess with, interact, or abuse any of the IPs, names, or identifiable information found in this video. I do not claim responsibility for any malicious activity targeting any of the systems or addresses found in this video.
Видео Malware Analysis | Obfuscated PowerShell Dropper (Part 1) канала Kindred Security
Twitter: https://twitter.com/kindredsec
Patreon: https://www.patreon.com/kindredsec
Twitch: https://www.twitch.tv/kindredsec
Discord: https://discord.gg/CCZCJCu
GitHub: https://github.com/itsKindred
========= DESCRIPTION=========
In this video, we breakdown an obfuscated PowerShell dropper that pulls a malicious binary off of compromised websites. We will breakdown the actual PowerShell dropper, then do some light dynamic analysis on the binary that the dropper grabs. There will be a part 2 of this video, where we will do some reversing on the binary itself to determine what activity the malware is capable of.
DISCLAIMER: Please do not mess with, interact, or abuse any of the IPs, names, or identifiable information found in this video. I do not claim responsibility for any malicious activity targeting any of the systems or addresses found in this video.
Видео Malware Analysis | Obfuscated PowerShell Dropper (Part 1) канала Kindred Security
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Live Malware Analysis | Checking out a User-land RootkitHow to Repair a DEAD ComputerWireshark - Malware traffic AnalysisWhat does a Malware Analyst Do? | Salary, Certifications, Skills & Tools, Bootcamp, Education, etc.Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIREDOSCP Preparation Guide and TipsMalware Theory - Oligomorphic, Polymorphic and Metamorphic Viruses9 Game Endings Almost No One Has Ever SeenRevoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using ScienceWhat NOT to do: Self Modifying Code - ComputerphileI Bought a $3 2TB USB Drive and Got More Than Just MalwareEmotet JavaScript dropper deobfuscation and analysisUsing Enums In PowerShell ClassesJScript Deobfuscation - More WSHRAT (Malware Analysis)Threat Hunting via DNS | SANS@MIC TalkThe Search for the Perfect Door - Deviant OllamMMORPG Bot Reverse Engineering and TrackingPowerShell Encoding and Decoding PasswordMalware Analysis: Rootkits, Part 2EMOTET - Interactive Malware Analysis with ANY.RUN