PowerShell CRYPTOSTEALER through DNS

Поділитися
Вставка
  • Опубліковано 8 тра 2023
  • j-h.io/snyk || Try Snyk to find vulnerabilities in your own code and applications FOR FREE ➡ j-h.io/snyk
    🔥 UA-cam ALGORITHM ➡ Like, Comment, & Subscribe!
    🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware

КОМЕНТАРІ • 74

  • @Aurem_YT
    @Aurem_YT Рік тому +55

    Powershell is so cool, you never have to worry about installation. Makes it easier

    • @rodricbr
      @rodricbr Рік тому +6

      yeah, I've never had much disposal to deep learn ps but it's really cool

  • @Lampe2020
    @Lampe2020 Рік тому +17

    18:35 That looks like someone actually modified the malicious DNS record instead of just removing it XD

    • @autohmae
      @autohmae 10 місяців тому +1

      yes, exactly

  • @DS6Prophet
    @DS6Prophet Рік тому +6

    John, you are an amazing Fella who always makes AAA+ quality videos! Huge props to you!! 😊
    I really have obtained lots of knowledge from your videos!

  • @manisharrora9525
    @manisharrora9525 Рік тому +8

    Already stopped the same attack thanks for this. Also did the malware analysis of the .ps1 file.

  • @justinpinson8575
    @justinpinson8575 Рік тому +1

    Love this content! Thank you for the analysis as always ❤️

  • @allurbase
    @allurbase 11 місяців тому +3

    That UUID at the top of the script in the registry is probably to change the signature of the script.

  • @stopper0203
    @stopper0203 Рік тому +2

    Love these videos 😎!!

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Рік тому

    Sho talented person.
    translation master and brother.

  • @muhammadtaha2578
    @muhammadtaha2578 Рік тому

    love your videos sir

  • @hyklmcjger9232
    @hyklmcjger9232 Рік тому

    Great video! Almost went into the rabbit hole together with you :D

  • @DarkFaken
    @DarkFaken Рік тому

    Thanks man!!

  • @theblankuser
    @theblankuser Рік тому

    Powershell stuff is interesting af

  • @pdkama
    @pdkama Рік тому

    thanks

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Рік тому

    Great master

  • @luketurner314
    @luketurner314 Рік тому

    13:01 and I'm here for it

  • @NederlandsPersoon
    @NederlandsPersoon Рік тому +9

    uuh, wtf. I found this on a pc two weeks ago, 3 PowerShell files with a name of 4 random characters with the exact same contents. I correctly identified it as a virus and did some research, after deleting it there still remained some other parts which I could not find (I am a noob on this), so wiped everything. Amazing to see a video on it

    • @NederlandsPersoon
      @NederlandsPersoon Рік тому

      I did think of sending it to you, just to see. But did not do it in the end, idk why

  • @demotedc0der
    @demotedc0der Рік тому

    aaawesome !!!

  • @khush1980
    @khush1980 Рік тому

    Good stuff here.. thanks
    What editor is that please

  • @muhammadtaha2578
    @muhammadtaha2578 Рік тому

    great

  • @muhammadtaha2578
    @muhammadtaha2578 Рік тому

    nice

  • @mynamesaretakenwtf
    @mynamesaretakenwtf Рік тому +12

    How are they injecting and running the PowerShell? It feels like we’re missing the initial attack.

    • @Dakktyrel
      @Dakktyrel Рік тому +6

      Phishing or adware would be my initial thoughts.

    • @UnfiItered
      @UnfiItered Рік тому

      Temp files/adware/malware. Unprotect your computer and visit as many fishy websites as you can. Then turn on your protection and watch it pick up a bunch of stuff in your temp folder.

  • @Sestain
    @Sestain Рік тому

    I had this too and not sure where I had gotten it.

  • @mattchub9887
    @mattchub9887 11 місяців тому

    Do you ever go live??

  • @raiddesu9687
    @raiddesu9687 Рік тому +5

    coolbase64 package for sublime would be useful for this kind of stuff since you do a lot of decoding ,you can just select and decode in sublime directly

    • @TechSY730
      @TechSY730 Рік тому +1

      For a moment there I thought scambot (EDIT: now banned and deleted) was doing a ^this style comment to reaffirm your suggestion.
      Which very well may be the first and only actually useful thing it did.

  • @asbestinuS
    @asbestinuS Рік тому +3

    How did you get to stage 2? Did I miss something? These ps1 scripts are just reading from registry and getting values. What values are they getting?

    • @UnfiItered
      @UnfiItered Рік тому

      So after the first stage ran, it output a base64 code. He decode it and it shows a block of code. That code is the second stage.

    • @3WL2
      @3WL2 Рік тому

      Stop fast forwarding through the video and you won't have to come to the comments to ask dumb questions.

    • @BryanLu0
      @BryanLu0 Рік тому +2

      Obviously, this malware sample comes from a Windows system. He just pulled the registry values off the system

    • @asbestinuS
      @asbestinuS Рік тому +2

      @@BryanLu0 I see, thank you kind sir.

  • @htconex19062012
    @htconex19062012 Рік тому

    This is so crazy 😂

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Рік тому

    More videos also following master

  • @jpsl5281
    @jpsl5281 Рік тому

    Why they store payloads as byte arrays?

    • @Sestain
      @Sestain Рік тому

      Most likely harder to detect since it needs to be put back together

  • @VulcanOnWheels
    @VulcanOnWheels Рік тому

    3:23 Shouldn't that have been, "to be able to be *run*?"

  • @Meletion1
    @Meletion1 Рік тому

    Second view including him!!!

  • @animeworld4775
    @animeworld4775 Рік тому

    What is crypto jacker

  • @brylozketrzyn
    @brylozketrzyn Рік тому

    One more reason to analyze DNS traffic

    • @scrpiona
      @scrpiona 11 місяців тому

      how to? any software or tips?

    • @brylozketrzyn
      @brylozketrzyn 11 місяців тому

      @@scrpiona Suricata + Elastic Security with Machine Learning module. Easiest, but needs ML license. Still few orders of magnitude more accessible, than some popular solutions

  • @logiciananimal
    @logiciananimal Рік тому +1

    Ingress/egress by DNS is so brutally annoying!

  • @imyoubutbetter9951
    @imyoubutbetter9951 Рік тому

    bro i m overwhelmed what programming languages do i need for cybersecurity?

    • @taureon_
      @taureon_ Рік тому

      what are you attacking?

    • @imyoubutbetter9951
      @imyoubutbetter9951 Рік тому

      @djr thanks man appreciate it also what can i do with java?

  • @chicoern
    @chicoern Рік тому +8

    Mind-blowing how these files brutally murder PowerShell. Even if you think about creating a file that doesn't make sense, to help disguise the malware, these scripts are terrible.

    • @DiSiBijo
      @DiSiBijo Рік тому +2

      huh?

    • @keylanoslokj1806
      @keylanoslokj1806 Рік тому

      He tripped?

    • @ancestrall794
      @ancestrall794 11 місяців тому +1

      I think he meant that the person who wrote the powershell script did a really poor obfuscation job

  • @ytsine404
    @ytsine404 Рік тому

    😅

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Рік тому

    One 🕐 login all

  • @Meletion1
    @Meletion1 Рік тому

    Lol holy 20 secs early

  • @onmc4754
    @onmc4754 Рік тому

    Wat

  • @yours-truely-sir
    @yours-truely-sir Рік тому

    third

  • @gavithgethmin8373
    @gavithgethmin8373 Рік тому +5

    I am in sri lanka. Fifteenth yeah old.

  • @pakekoding
    @pakekoding Рік тому

    They tell me to keep comment on your video to get more subs.
    so, am I need auto comment bot or something? 🤔

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Рік тому

    Codo details (echo Iymjmjimy) creation of the code different

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Рік тому

    So experience tools and codo nt mes tycopo mistake never to give up open tool hydel.

  • @commanderpaladin
    @commanderpaladin 9 місяців тому

    The guys that saved everyone from becoming victims. GG

  • @JavierVelasco8
    @JavierVelasco8 Рік тому

    Omg i was like 1000 🥹 thank you, John. Amazing content as usual