Static and Dynamic MALWARE ANALYSIS | Agent Tesla from an AutoIT EXE

Поділитися
Вставка

КОМЕНТАРІ • 12

  • @vkdog1676
    @vkdog1676 8 місяців тому

    Just recently completed a course in analysis and RE and keen to see others workflows, so this helps! Thanks.

  • @adriankydlandskaftun1799
    @adriankydlandskaftun1799 7 місяців тому

    Great work! Thanks for sharing with us

  • @2bit_10
    @2bit_10 8 місяців тому

    Great work as always Jai

  • @jaylal4899
    @jaylal4899 8 місяців тому

    thanks, learned a new tool ie pe-sieve

  • @poiipoii31270
    @poiipoii31270 8 місяців тому

    Just got into Mal RE ! that was interesting

  • @uuzumakifox9
    @uuzumakifox9 8 місяців тому

    Hey Jai, great content! thanks :)
    Any chance you can point me to a download link for Autoit extractor?
    i saw that the original Gitlab of the author is down :(

    • @cyberraiju
      @cyberraiju  8 місяців тому

      Oh really? 😧
      I believe this is the same copy of it, albeit it may be shared by someone else:
      github.com/digitalsleuth/autoit-extractor

  • @bullethead1953
    @bullethead1953 8 місяців тому

    nice vid
    How do you investigate a sample that is super obfuscated and also sleeps for a long time so dynamic analysis isnt really possible?

    • @cyberraiju
      @cyberraiju  8 місяців тому

      Really depends on the sample, what obfuscation is used, and what you're trying to take away from it. Got an example?
      For example:
      - if it's obfuscated using a commodity obfuscator and is dotnet, then de4dot may automatically deobfuscate for you.
      - if it's sleeping using a Windows API you could hook that API and just have it return, now the sleep isn't an issue and dynamic analysis can continue.
      - github.com/x64dbg/ScyllaHide has a lot of capability when it comes to malware that tries to defeat dynamic analysis

    • @bullethead1953
      @bullethead1953 8 місяців тому

      ah thanks!

  • @EnLopXf
    @EnLopXf 8 місяців тому

    Can you share all your tools use on malware analysis

    • @cyberraiju
      @cyberraiju  8 місяців тому +1

      Unfortunately that'd be nearly impossible. It is always expanding depending on what needs analysing.
      All tools used in the video are in the description. As a starting point I'd look at the tools included in Flare VM and customise it as needed.
      github.com/mandiant/flare-vm