Загрузка...

Malware Analysis | Reversing A .NET Malware | Backdoor.MSIL.Agent

Hi! This video is almost like a live one. I'll be reversing a random malware that I picked up as a challenge to reverse engineer. We'll try to understand how this malware works and what level of control this can give to C2C on the victims computer. You'll also notice that the conclusions that we made in this video are also found in several reports present regarding this family of malwares. I'm a complete beginner in malware analysis, so if you're an expert or atleast have some intermediate knowledge in the field then please help me out by commenting and giving some useful info. If you're a beginner and you also have some awesome tips, then please do share ;-) You can also share some malware samples and maybe I'll give it a try... Thanks for watching! Hope you enjoyed the analysis ;-) Download Sample : https://drive.google.com/file/d/1C6W7ywXYVBus7k_NnOtVdfX_NhmkofEe/view?usp=sharing Password for all compressed files is "infected" Some links to help you : https://threats.kaspersky.com/en/threat/Backdoor.MSIL.Agent/ https://malwaretips.com/blogs/svchost-exe-virus-removal/ lifewire.com/scvhost-exe-4174462 https://lizardsystems.com/articles/configure-windows-firewall-using-command-line/ https://www.codevba.com/office/environ.ht #.YzmZVdIza00 https://www.atmosera.com/blog/handling-open-file-security-warning/ https://www.pinvoke.net/default.aspx/user32.getwindowtext

Видео Malware Analysis | Reversing A .NET Malware | Backdoor.MSIL.Agent автора Где и как решить
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять