Malware Analysis - JS to PowerShell to XWorm with Binary Refinery

Поділитися
Вставка
  • Опубліковано 19 вер 2024

КОМЕНТАРІ • 6

  • @riskydissonance
    @riskydissonance 5 місяців тому

    Great video as always, I always learn something new!

  • @fabo8819
    @fabo8819 5 місяців тому

    Good morning Karsten. I encountered same obfuscation method in AgentTesla new compaign.

  • @PrinterJamOnToast
    @PrinterJamOnToast 22 дні тому

    Thank you for the analysis. Next time could you link the sample of each stage please? Without VT enterprise I can't obtain the atom.xml payload as the site is offline and as it is executed in memory I don't see file artefacts in public sandbox reports, so can't follow along.

    • @MalwareAnalysisForHedgehogs
      @MalwareAnalysisForHedgehogs  21 день тому +1

      Hey, thank you for the hint! I forgot to include it when publishing the video. I will update the description.
      Here is atom.xml malshare.com/sample.php?action=detail&hash=cb21368467bdf0ca8a4cd458f54d684e10da2d43a9c7285e094d39bdc410fb10

  • @HadarSt-ed4gi
    @HadarSt-ed4gi 5 місяців тому

    How did you know which word to remove in the beginning?

    • @MalwareAnalysisForHedgehogs
      @MalwareAnalysisForHedgehogs  4 місяці тому

      Because it is repeated. So removing it, will remove the bloat.
      Sorry for the late reply, I somehow did not see your comment.