Unraveling the IcedID Malware Stager & Phishing Email

Поділитися
Вставка
  • Опубліковано 21 лис 2024

КОМЕНТАРІ • 106

  • @luketurner314
    @luketurner314 Рік тому +108

    In my opinion, reading out the wacky variable names adds an extra layer of entertainment on top of the already great content

    • @CM-xr9oq
      @CM-xr9oq Рік тому +7

      it was hilarious. John knew he was sounding crazy. "What kind of video IS THIS?!?"

    • @Lampe2020
      @Lampe2020 Рік тому +3

      Was about to comment "It's next level entertainment to stubbornly keep reading out those variable names!"...

  • @laurenlewis4189
    @laurenlewis4189 Рік тому +24

    Hey! It's time for my 15 minutes of fame! Thank you for these educational vids, and thanks for the emails acknowledging my email/letting me know you would make this video.
    I got about as far as John did 15 minutes into the video, and at the time my javascript knowledge was so tenuous I couldn't figure out what happened next. My apologies to you all for not getting far enough to download the DLL from the attackers' server. Since my coworker/boss/nemesis was a little more vigilant after a previous (less interesting) phishing attack (that had worked), they did not detonate this payload and we never saw the later stages.
    Given that Zero2Auto course is only about $200, I'm absolutely gonna look into that. This series is some of my favorite cybersecurity education, along with the videos teaching DIY lab setups and playing around with pentesting them, and I'd pay at least that much to learn how to do my own in-depth malware analysis.
    P.S. even if I had been a little more skilled, I probably still wouldn't have downloaded the DLL; it's my understanding that some of the variables set in the url identify the target and would probably result in my coworker getting more attention from future campaigns

  • @peternavarroiii3944
    @peternavarroiii3944 Рік тому +10

    Love the way you unpacked the entire thing. Mind blowing lol. The amount of experience and skill it takes to get to this level.

  • @martin3009
    @martin3009 Рік тому +13

    Would love more malware analysis / deobfuscation videos! They are really interesting and I'm absolutely hooked, even though I don't always completely understand how they're constructed.
    Hope you'll post more, even if we've seen the malware before

  • @pouyatoutounchy1238
    @pouyatoutounchy1238 Рік тому +3

    I enjoy this type of video, more of these, please!
    I receive millions of this type of malware in my email and I do go through them but the way you do it is fun and I like it a lot!

  • @nikopisker8902
    @nikopisker8902 Рік тому +73

    One day I'm gonna be on this level of CS

    • @c1ph3rpunk
      @c1ph3rpunk Рік тому +13

      You won’t if you think this is CS.

    • @123sleepygamer
      @123sleepygamer Рік тому

      @@c1ph3rpunk What is CS even a shortening for in this context? I'm very involved in the IT world and I've never heard of that.

    • @Charybdis47
      @Charybdis47 Рік тому

      @@123sleepygamer i think he means cyber-security

    • @JoakimBB
      @JoakimBB Рік тому +4

      It's either Computer science or Cyber security

    • @nikopisker8902
      @nikopisker8902 Рік тому

      @@c1ph3rpunk why not?

  • @PenAce
    @PenAce Рік тому +9

    I absolutely adore the methodical dissection of code and your method of stepping through it with the jokes. Legend!

  • @sharkking9679
    @sharkking9679 Рік тому +13

    Thank´s so much for this kind of walktroughs. It made me wanna get more into this.

  • @CM-xr9oq
    @CM-xr9oq Рік тому +2

    Those variable and function names will drive anyone crazy. I was really hoping it would somehow end up with Opposite("Always coming from take me down")

  • @Stroopwafe1
    @Stroopwafe1 Рік тому +4

    Never thought that the technique I used as a kid to up my word count in word by changing the font colour would be used by malware, since it seems so obvious now as an adult

  • @mollthecoder
    @mollthecoder Рік тому +5

    As a JS dev, it hurt my soul when you got the window error

  • @JanRautiainen
    @JanRautiainen Рік тому +1

    I am just waiting to receive my first phishing attempt so I could also try to dissect my first malware for analysis

  • @England91
    @England91 Рік тому +2

    It's good that window defender caught and flagged this

  • @scottch4444
    @scottch4444 Рік тому +2

    Love these kind of vids. Have you ever done similar videos with the samples from the malware traffic analysis site?

  • @kyputer
    @kyputer Рік тому +3

    This video rocks. Thanks, John! :D

  • @LinuxJedi
    @LinuxJedi Рік тому +8

    i love it when you do malware analysis

  • @dezwilliamz
    @dezwilliamz Рік тому +2

    Great work! You always come out with some really informative and educational videos! Love it!

  • @alexlefevre3555
    @alexlefevre3555 Рік тому +4

    If only everyone knew shenanigans when they saw it... such as such a polite ask to enable all the doom from the file. It looks innocent enough if you simply didn't know any better.

  • @franzxawer4501
    @franzxawer4501 Рік тому +5

    I love it 👍
    greetz from Germany

  • @gdr1174
    @gdr1174 Рік тому +5

    Very informative thanks 👍

  • @willievandermerwe907
    @willievandermerwe907 Рік тому +1

    Awesome content and well presented, well worth a watch

  • @DarkFaken
    @DarkFaken Рік тому +1

    This was so enjoyable to watch, thanks for sharing 😁

  • @Mohitkumar-ug8jq
    @Mohitkumar-ug8jq Рік тому

    My favourite video of phishing

  • @-stoner
    @-stoner Рік тому +1

    I love it when someone tries to understand my malware
    I DO NOT KNOW HOW TO CODE THIS IS NOT MY MALEARE ALL JOKS

  • @HuhnK0t
    @HuhnK0t Рік тому

    good day, enjoyed as always. is ooknibs still a thing?

  • @bradley6727
    @bradley6727 Рік тому

    The tag is backwards and an hta file. Nice

  • @sRCx0sweetRusHC0d3r
    @sRCx0sweetRusHC0d3r Рік тому

    Great Stuff John

  • @moustafakashen3610
    @moustafakashen3610 Рік тому

    Love the content John!

  • @mandooooooo781
    @mandooooooo781 Рік тому +2

    hi john

  • @heathbarnhart1092
    @heathbarnhart1092 Рік тому +5

    Pre-watch prediction: houdini.
    The obfuscation method was interesting. Certainly confusing to read, but I imagine it would make it easier to detect based on signature.
    Prediction: :(

  • @phorsakenn
    @phorsakenn Рік тому +3

    Okayy finna watch this before the majority hehe

  • @pqudah
    @pqudah Рік тому

    Nice stuff, an absolutely entertaining series
    Is there a way to submit some malware I got for analysis?

  • @guilherme5094
    @guilherme5094 Рік тому

    Thanks John👍

  • @Bobbias
    @Bobbias Рік тому

    God I wish the obfuscated code I've come across was this easy to dissect.

  • @Jeeeee-in6hi
    @Jeeeee-in6hi Рік тому +2

    I love your videos! I also couldn’t stop laughing with the function names doorpowlove lovekarolpumps😂😂

  • @JuJuMunozGolf
    @JuJuMunozGolf Рік тому

    Hello. I’m completely new to the space of cybersecurity, like no background in IT at all. What would you recommend for a beginner like me.

  • @narayananr8650
    @narayananr8650 Рік тому

    @John Hammond can you share a sample of the maldoc if possible ?

  • @xantochroi
    @xantochroi Рік тому

    thanks for the well made videos.

  • @dr.pentest5691
    @dr.pentest5691 Рік тому

    Thank you very much for your valuable information

  • @TxRedneck
    @TxRedneck Рік тому

    I did enjoy this one, thanks man!

  • @NoportOfbot
    @NoportOfbot Рік тому

    thanks john, and again i learned something new :)

  • @blinking_dodo
    @blinking_dodo Рік тому

    Nice stuff.
    Looks like stuff i could do too though...
    How much does this kind of work pay? 🙃

  • @guruhariroxz
    @guruhariroxz Рік тому +1

    Oh John, you read js source code better than a JS developer xD

  • @AnalogMonkey-dr1yw
    @AnalogMonkey-dr1yw Рік тому

    Hey John... maybe I'm late to the party and thinking something that goes without saying for others. I'm also not yet totally code-smart and running off of a kindof general analysis, but is it possible to re-examine this from the following angle:
    Is the while loop decrypting the long string in dowGirlDow, pointing back to the index within the doorPowNext string? Obfuscation via cipher, then use of the while loop to decipher a payload?
    Or am I off base? Or stating something obvious?

  • @scottch4444
    @scottch4444 Рік тому

    But where did you get that shirt?

  • @Sch8ill
    @Sch8ill Рік тому +1

    [DISCLAIMER]: Video is too good...

  • @vrushabhpatil2867
    @vrushabhpatil2867 Рік тому +2

    why did you give such reaction on 25:22 timeline

    • @brianb5723
      @brianb5723 Рік тому

      Because his huge monitors flickered, a VM issue. Not related to the reversing

  • @tomysshadow
    @tomysshadow Рік тому +3

    I don't understand why malware writers go to this effort to obfuscate their code. Do they think it'll bypass Windows Defender? It clearly doesn't, we saw it get caught right away. I feel like this is barely more effective at evading antivirus than if they didn't attempt at all. Am I wrong?
    It seems like "stages" are such a common theme in these videos, but what would prevent the DLL at the end of the video from being detected before it is run? What difference does it make how many steps they take before downloading and executing it if the buck stops there? Don't the stages just present more opportunities for detections of the various files created along the way? Wouldn't the obfuscation set off red flags for heuristic searches because of how obviously different from ordinary software they are with all the nonsense and gibberish?

    • @ThaKinGuiN
      @ThaKinGuiN Рік тому +3

      The specific code(stages or DLLs) has to be recognized by AV first before it can be blocked. Hash-detection for i.e. the password-protected Word-document you receive or stages you download is broken by simply changing 1 character in the script and recompile it, which just takes seconds for the bad guys. If they're targeting specific high-value targets they can even make "different" payloads for each individual.
      What the malware-writers hope for is unrecognized code or PC's that do not have the latest patches for Windows or the latest signatures for AV. As soon as your AV is updated for this malware, it can and will block it.
      AV does not just block everything with i.e. eval and a download-function in it as those are legitimate functions for your PC. And that's also why you see the URLs where they download the next stages constantly change, AVs can only block URLs that they know are compromised, so there's always a small timeframe these URLs are not blocked by AV or firewalls.

    • @damuffinman6895
      @damuffinman6895 Рік тому

      A simple Google search would answer every single one of your questions.

  • @violetwtf
    @violetwtf Рік тому

    feel like these are acronyms, doorLikeLike = DLL?

  • @paritoshbhatt
    @paritoshbhatt Рік тому

    Insightful

  • @gpdally-tupa
    @gpdally-tupa Рік тому +2

    LoadsLikeVidieo 👍

  • @frofro7355
    @frofro7355 Рік тому

    Couldn't you just replace that eval with console.log?

  • @Asiegrist92
    @Asiegrist92 Рік тому

    The first comment about a bot farm pushing what looks like an investment scam is very entertaining.

  • @hassanaliraza78
    @hassanaliraza78 Рік тому

    can u please share the copy of this file. need to experiment on it

  • @psychoSherlock
    @psychoSherlock Рік тому

    Him at 25:22 😂🤣😹 LOL

  • @HTWwpzIuqaObMt
    @HTWwpzIuqaObMt Рік тому +1

    Just close your eyes and listen to "doorPowDow"

  • @darkcasterx4628
    @darkcasterx4628 Рік тому +1

    bro these function and variable names got me confused as a mf

  • @m.m.m.c.a.k.e
    @m.m.m.c.a.k.e Рік тому

    Arch nemesis 😅

  • @marksvirsky9103
    @marksvirsky9103 Рік тому +3

    It says windows user in russian so… Russian virus? 10:50

    • @slonkazoid
      @slonkazoid Рік тому

      Doc language is also set to Russian

  • @deancrypto5939
    @deancrypto5939 Рік тому

    RIP VK

  • @JohnRickey-b5w
    @JohnRickey-b5w Рік тому

  • @yakingvet
    @yakingvet Рік тому +1

    🤘🏻🤘🏻

  • @AMarshnuts
    @AMarshnuts Рік тому

    I have Parrot OS Security Edition I Can Hack useing Ready Scripts

  • @petrovasyka8
    @petrovasyka8 Рік тому

    Yo dude , malware creator is Russian speaking person

  • @surkewrasoul4711
    @surkewrasoul4711 Рік тому

    😂☠️🎃👎🏆🎖️🏅🥉🥈🥇🥇😂😂😂😂👎👎🥴🥴🥴🥴🥴🥴🥴🥴🥴🥴👏👏👏👏👏👏👏👏

  • @lil-link
    @lil-link Рік тому

    why are you pronouncing copeland as "copelagen"? 😅😅

  • @edisdead2008
    @edisdead2008 Рік тому

    enough with the ads. this makes for cringe content and i don't want to watch anymore.

  • @weniweedeewiki.6237
    @weniweedeewiki.6237 Рік тому +1

    yes my g