Analyzing Ransomware - Dumping a CryptoAPI Keygen

Поділитися
Вставка
  • Опубліковано 16 січ 2025

КОМЕНТАРІ • 25

  • @yakovgoldberg7108
    @yakovgoldberg7108 6 років тому +2

    You rock! Thank you for sharing these awesome videos with us.

  • @present5343
    @present5343 6 років тому +1

    Dude you make it seems so easy! Good job

  • @beeb490
    @beeb490 3 роки тому

    you are more than awesome maaaaaaaaaaan

  • @hackfans8143
    @hackfans8143 2 роки тому

    Awesome tutorial, but how can I dowload the sample without registering

  • @karthikeyankumar4078
    @karthikeyankumar4078 2 роки тому

    Hi, My xdbg32 not creating decode.txt file in my c windows folder after CreateFileA api, not even encrypting the machine. Anything i needed to be done before

    • @bobo-px5gy
      @bobo-px5gy 5 місяців тому

      maybe it's about debbugging issues that has already done, or you're using a diff os version !

  • @Iamrkapoor
    @Iamrkapoor 3 роки тому

    Hi Michael, Thank you for sharing this.
    I have 2 questions here.
    1. So, we could extract the plaintext session key because the cryptexportkey() wasn't using hExpkey (that is using the public key/rsa key to encrypt the session key while exporting) ?
    2. Also, in my lab, the malware doesn't create decode.key under windows folder when I step through Createfile(). Any points what could be wrong ?

  • @sirreggiereginald2542
    @sirreggiereginald2542 5 років тому

    Question for you, since the unencrypted AES key was in memory, would performing memory forensics after the malware is executed possibly lead to key recovery?

    • @Demonslay335
      @Demonslay335  5 років тому

      Theoretically, yes, assuming it wasn't properly zero'd from memory. Never had experience with that working personally once the executable has exited and the memory overwritten by another process.

  • @theshiv303
    @theshiv303 6 років тому +1

    heh dude, he said sex 3:57

  • @nathanuchoa9130
    @nathanuchoa9130 6 років тому

    Hello, Michael!
    How to get Crypto Tester?
    sorry my english I'm learning, hugs from Brazil.

    • @Demonslay335
      @Demonslay335  6 років тому +1

      I haven't published it yet - it's a tool suite I wrote. I'll make a video highlighting it when it's released. 😉

    • @nathanuchoa9130
      @nathanuchoa9130 6 років тому

      @@Demonslay335 thanks, very nice video friend

  • @jovensotto7701
    @jovensotto7701 5 років тому

    Dear Michael,
    I need ur advise, I was infected by a Virus name: Nemty & Kvag at the same File, pls do help me,.

    • @Demonslay335
      @Demonslay335  5 років тому

      Nemty, contact Tesorion CISRT. For Kvag, aka STOP Djvu, read the BleepingComputer support topic FAQ.

  • @rpsingh7558
    @rpsingh7558 4 роки тому

    with your knowledge one day you will break RSA encryption and ransomware

    • @Demonslay335
      @Demonslay335  4 роки тому

      That's not how it works... RSA-1024 and above will only be breakable using a quantum computer that is leagues above what's available right now. We're a good 20-30+ years from such a thing.

    • @rpsingh7558
      @rpsingh7558 4 роки тому

      @@Demonslay335 i know sir, but i wish someday it happen

    • @rpsingh7558
      @rpsingh7558 4 роки тому

      i had a txt file in windows folder written public key inside , is it helpful?

    • @Demonslay335
      @Demonslay335  4 роки тому

      @@rpsingh7558 If it's RSA-1024 or above, no. It's called the RSA factoring problem.

    • @rpsingh7558
      @rpsingh7558 4 роки тому

      @@Demonslay335 thanks but how i know its 1024 or 2096 etc