Malware Analysis - Fun With Fiddler
I found this gem on Virustotal. It crashes and we use Fiddler to make it dance.
Follow me on Twitter: https://twitter.com/struppigel
Sample: https://www.hybrid-analysis.com/sample/895541ff2205b820ae4e3de8db6d242c6358614ca5392030850d5a22dadcf5f5?environmentId=100
Bleepingcomputer article: http://www.bleepingcomputer.com/news/security/fake-cain-xpii-cleaner-app-is-actually-a-backdoor-with-very-annoying-features/
Fiddler: http://www.telerik.com/fiddler
Видео Malware Analysis - Fun With Fiddler канала MalwareAnalysisForHedgehogs
Follow me on Twitter: https://twitter.com/struppigel
Sample: https://www.hybrid-analysis.com/sample/895541ff2205b820ae4e3de8db6d242c6358614ca5392030850d5a22dadcf5f5?environmentId=100
Bleepingcomputer article: http://www.bleepingcomputer.com/news/security/fake-cain-xpii-cleaner-app-is-actually-a-backdoor-with-very-annoying-features/
Fiddler: http://www.telerik.com/fiddler
Видео Malware Analysis - Fun With Fiddler канала MalwareAnalysisForHedgehogs
Показать
Комментарии отсутствуют
Информация о видео
12 ноября 2016 г. 1:48:04
00:07:59
Другие видео канала
Five Awesome Tools to perform Behavioural Analysis of MalwareFiddler tutorial to help Webscraping & API calls / Monitor the Network trafficAdvanced VirusTotal Tutorial | Learn CybersecurityMalware Analysis - Malware Hunting and Classification with YARAMalware Theory - Oligomorphic, Polymorphic and Metamorphic Virusesb00t2root19 CTF: Loopback [PCAP Forensics]Wireshark - Malware traffic Analysis | Practical | Interview questions | CYBERSEC LIVEMalware Analysis - Simple Habits to Stop Going Down the Rabbit HoleMalware Theory - Process InjectionThree and a half ways to unpack malware using OllydbgMalware Analysis - Code Injection via CreateRemoteThread & WriteProcessMemoryMost controversial files on VirusTotalIDS and IPSMalware Analysis - DOSfuscation DeobfuscationMalware Analysis - Unpacking NetWiredRC With DnSpyReversing Malicious Office Document (Macro) Emotet(?)Malware Analysis - Unpacking with HxD and PythonMalware Theory - Basic Structure of PE FilesMalware Theory - Understanding .NET Streams and Metadata