Reverse Engineering RC4 Crypto For Malware Analysis
This tutorial covers how to identify, verify, and decrypt RC4 encryption in malware using IDA Pro and the x64dbg debugger.
Sample: Warzone RAT: 3fb379e877ca6b03d0d779ec9efe17c91f9f630ba1b266096edc25137c90796c
https://malshare.com/sample.php?action=detail&hash=3fb379e877ca6b03d0d779ec9efe17c91f9f630ba1b266096edc25137c90796c
-----
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
OALABS PATREON
https://www.patreon.com/oalabs
OALABS TIP JAR
https://ko-fi.com/oalabs
OALABS GITHUB
https://github.com/OALabs
UNPACME - AUTOMATED MALWARE UNPACKING
https://www.unpac.me/#/
-----
Wikipedia overview of RC4:
https://en.wikipedia.org/wiki/RC4
Python implementation of RC4 (for decryption in scripts):
https://gist.github.com/OALabs/1b07f7ef90e19e77745cad4101af78e9
CyberChef Online Tool:
https://gchq.github.io/CyberChef/
Feedback, questions, and suggestions are always welcome : )
Sergei https://twitter.com/herrcore
Sean https://twitter.com/seanmw
As always check out our tools, tutorials, and more content over at https://www.openanalysis.net
#ReverseEngineering #Encryption #RC4 #MalwareAnalysis
Видео Reverse Engineering RC4 Crypto For Malware Analysis автора PHP С нуля
Видео Reverse Engineering RC4 Crypto For Malware Analysis автора PHP С нуля
Информация
1 декабря 2023 г. 2:02:24
00:15:56
Похожие видео



















