But then he would have been on 8-12 screens and typed those 200k characters (hacking is typing fast), it's all hard to follow. It would be like watching the Matrix.
I love how they went through six stages of obsfuscation, and a lot of effort into hiding what they were doing.... but their payload was literally called "Attack.jpg" like surely they could have named it something at least slightly less blatant.
Perhaps they didn't care to hide it at that point? I know that obfuscation helps to counter analysts, but when the code is downloading data from a URL, then I suppose it wouldn't've been worth their effort to obscure the name of the download. Then again, they could've made a second download with totally unnecessary data. Either way - this thing is bad (for you)! xD
@@garethevans9789 Pentesting tools are released open source because not only is open source more effective, but it makes sure that the developers are not potentially profiting off of malicious actors, intentionally or not.
John, as you are very good, you should stand this comment: In Powershell a "split (..)" is a regular expression splitten in string in portione of two characters, ie "4142" becomes "41", "42", in Hex AB
the evolving of rat is so amazing, i remember in late 90's where sub7, netbus and back orifice was so popular and inspired me into hacking. IRC was the channel to go to before and dial up is your connection.
This style of video really helps me with my start in forensics and malware analysis. I love liveoverflow and other CTF summary channels but they often feel like magic in the way they present their findings. Keep up the great work :3
Whatever that quality is that great teachers have, you have it. Never change the format of your videos. I love seeing you troubleshoot and reason through everything live.
I've taken apart stuff like this (when I worked in large enterprise) but the samples were rarely more than 3-4 levels deep. This actually looks a lot more like a challenge you'd get at a CTF competition _(perhaps they're getting ideas from each other)_ ?
I'm just finding this channel and its quickly becoming my favorite content. Im fascinated with all of this. Really inspires me to get started with basic coding to get my feet wet.
Where have you been all my CS degree? This is awesome watching this stuff in action as you do it. I love the content! Definitely going to keep watching!
Dude you are simply awesome...it's so enriching for all of your viewers to see your hard work and all your skills, and the best of all is that we can see you enjoying so we enjoy and learn too. Regards from Spain!
Great video, I love this series. Also special thanks for zooming in this much, watching code-related stuff on phone is usually a pain, but not in your case. Keep up the good work!
I was watching some scam baiting videos and also doing some deep dives into RATs and just... CyberSec/CompSci things in general and found this video. I'm glad I bumped into your channel. Really good stuff you have going on here
Damn, I just watched over an hour of stuff I have no clue of and I still feel educated and entertained. It even kinda makes sense, when you talk about it and explain some stuff. Thank you very much! :)
I love these malware analysis videos. You break stuff down to a fairly easy to understand level for most technical people. I'm just getting into cyber security and I'm really enjoying your content, thank you.
Been programming for a long time, but never really looked much into viruses and malware. Cool analysis. The authors sure work hard to make their installation as painless as possible.
59:06 love how scrolls past when looking at string in the executable "Offline Keylogger Started" "Online Keylogger Started" "Online Keylogger Stopped" "Offline Keylogger Stopped" Yes John sees the key strokes and is like, "is this doing keylogging?"
This is crazy. I've learned more about malwares in a few vids I saw from you, than the time I spent trying to get into the field years ago. I'm a fulltime dev now and have been working for over 7 years. Reminds me of my recent grad days where all I wanted was to understand this. Much easier to follow now, and damn, learning so much so quick now. Props to you.
I never write a comment under a video but I saw every single second and I really really loved it. Thanks for your video and keep doing it sharing your passion with us!
John: releases a video with malware analysis Me after watching a video: *Lemme check real quick whether notepad.exe is running in the background or not in Task Manager*
@@Reelix I didn't even mention an OS? I am aware that Linux isn't perfect as so with every software product (opensource or not). The worst thing you can do to your security is to be over confident in your defense.
As a prospective sw engineer, at ~54:00 that obfuscated spaghetti mess made me never want to be a malware analyst 🤣😂🤣 glad to have people with your mettle in this world
Totally enjoyed the video. It was an absolute rollercoaster ride. I love the way you present and explain the details in all your videos. And also none of your videos ever seem to be monotonous even when we are dealing with such mind boggling stuff because of the way you laugh and get excited when you crack/deobfuscate a piece of code. 😁 Thank you so much for taking the effort and sharing the awesome work😊
You make easy to understand videos as you break things down. i really enjoy them. I have a vague understanding of coding and the way you work is easy to follow.
Dude... That was solid. Loved it. Kinda dragged in the middle but I was invested enough I just jumped ahead maybe ten minutes before I was stuck back in. Nice nice so nice I had to say it twice, then one more time too.
Wow, that was awesome video. It is so nice to see you go through all the steps and thinking while deobfuscing. This RAT is kind of really scary for everything it can do. I would like to see more of this in the future! Keep up the good work
"This is just 75 lines of code"
*Half hour later*
"201 thousand characters selected"
that's how they get you man, that's how they get you.
@@AlucardNoir AND YOU BUT GUESS WHO NOT?! ME AND JOHN
Majorly loaded by a fake jpg ;)
@@geist453 l
@@bansku570 I
Ngl, never thought it would be so much fun watching someone analyse and breakdown a virus.
I was thinking the same thing! I might have just discovered my new rabbit hole lol
Love this malware analysis series!
Me too! Amazing series
I love it too!
me too, this guy is really good.
Sir. Can I use remcos rat to hack Android...
Content like this is why I don't have to pay for cable, satellite, or netflix!
But then he would have been on 8-12 screens and typed those 200k characters (hacking is typing fast), it's all hard to follow. It would be like watching the Matrix.
Yeah
Okay, but consider this: TOS and TNG are on Netflix.
I love how they went through six stages of obsfuscation, and a lot of effort into hiding what they were doing.... but their payload was literally called "Attack.jpg" like surely they could have named it something at least slightly less blatant.
Perhaps they didn't care to hide it at that point? I know that obfuscation helps to counter analysts, but when the code is downloading data from a URL, then I suppose it wouldn't've been worth their effort to obscure the name of the download. Then again, they could've made a second download with totally unnecessary data. Either way - this thing is bad (for you)! xD
The REMCOS developer "discourages malicious use". For sure, everyone will use solely for legitimate purposes.
'sure if you say so' meanwhile no one uses it legitimately
Malicious actors: amma head out
Ethical hackers don't sell hacking toolkits, ethics and all that... 🤷♂️
@@garethevans9789 Pentesting tools are released open source because not only is open source more effective, but it makes sure that the developers are not potentially profiting off of malicious actors, intentionally or not.
Meh, skids are gonna find a way anyway. With our without this program.
Damn that was fun to watch!! Thanks and keep them coming!!!!!!
I love when John is laughing over the Attack.jpg url
best part
Times must be hard, Ed Sheeran is writing python.
Lmaooo💀💀
he looks like an unscuffed burgerplanet
This is ed sheerhan and Seth rogans kid.
You are the hacker version of pewdiepie. Very entertaining to watch.
Nah he looks like a de deobfuscated Ed Sheeran
John, as you are very good, you should stand this comment: In Powershell a "split (..)" is a regular expression splitten in string in portione of two characters, ie "4142" becomes "41", "42", in Hex AB
Scheduling this to start at the same time as the new mars rover is landing... Bold move cotton, let's see how it works out
Bah, totally didn't even realize xD Ah well!
@@_JohnHammond I’d prefer watching this over some rover landing
@@tripplefives1402 isn’t the rover automatically controlled because the delay would be 10 minutes long?
the evolving of rat is so amazing, i remember in late 90's where sub7, netbus and back orifice was so popular and inspired me into hacking. IRC was the channel to go to before and dial up is your connection.
So far this is the most fun I've had watching hacking videos. Your analysis is fantastic and I enjoy seeing your process. Keep it up!
Nobody:
Virus Code: * Does malicious stuff*
John: Is it trying to do something bad? HAHAHA
Us: Duhhh John. wtf
This style of video really helps me with my start in forensics and malware analysis. I love liveoverflow and other CTF summary channels but they often feel like magic in the way they present their findings. Keep up the great work :3
Pretty sure you need to run the obfuscated version of the AMSI bypass.
Great video, would love to see more of these!
After watching this, gained a keen interest in Malware Analysis. Thanks for the awesome content.
This is one of the best educational videos i've seen
that url has to be the greatest thing ive ever seen
Amazing work, you deserve the money from the UA-cam overlords. Literally only commented to help boost those algos.
Whatever that quality is that great teachers have, you have it. Never change the format of your videos. I love seeing you troubleshoot and reason through everything live.
I've taken apart stuff like this (when I worked in large enterprise) but the samples were rarely more than 3-4 levels deep. This actually looks a lot more like a challenge you'd get at a CTF competition _(perhaps they're getting ideas from each other)_ ?
Algorithm, give this man the recs.
It worked. That's why I'm here.
this is gonna be good
Indeed Indeed :D
The guy that wrote the script watching this video rn must be like 👁️👄👁️
I'm just finding this channel and its quickly becoming my favorite content. Im fascinated with all of this. Really inspires me to get started with basic coding to get my feet wet.
You need I high level of nerdiness to find this entertaining. Proof: I find highly entertaining!
Love this.
Loving this series. Would like to see some disassembling malware analysis.
In the next episode... John rewrites the kernel for more efficient find and replace..... STONKS!
Where have you been all my CS degree? This is awesome watching this stuff in action as you do it. I love the content! Definitely going to keep watching!
I love John’s response when the light bulb goes off and all the hard work comes together. Great video as always.
i missed the premiere, but this is definitely a blast to watch. Would love to see this more
"guys, you might think i'm dumb" LOL exact opposite.
Dude you are simply awesome...it's so enriching for all of your viewers to see your hard work and all your skills, and the best of all is that we can see you enjoying so we enjoy and learn too. Regards from Spain!
Plottwist: this is all just an advertisement for BreakingSecurity
Hands down one of the best malware analysis walkthroughs I’ve seen. Watched it twice.
Great video, I love this series. Also special thanks for zooming in this much, watching code-related stuff on phone is usually a pain, but not in your case. Keep up the good work!
I was watching some scam baiting videos and also doing some deep dives into RATs and just... CyberSec/CompSci things in general and found this video. I'm glad I bumped into your channel. Really good stuff you have going on here
"is this the newest version? because that would be pretty slick"
*immediately scrolls past the version number 3.1.0 showing it is the latest version*
these videos are underrated hidden gems.
i swear why didnt i get them in my reccomended earlier.
Damn, I just watched over an hour of stuff I have no clue of and I still feel educated and entertained.
It even kinda makes sense, when you talk about it and explain some stuff.
Thank you very much! :)
every single line "I don't exactly know what is going on here" so basically this guy is just us trying to understand code. got it.
Please more Malware Analysis videos. So much fun to watch.
"Can I get anything out of Melons?"
You can get juice, John. Juice.
Well worth the watch. This is a great video. Please do more. :)
how do you copy and paste into VirtualBox in Windows 10
Did i just watch AN HOUR of malware analysis? Dude, you're awesome!
Man i'm brazillian, and i love all of this videos, but this... mannn to amazing !! Continue delivery this content to us, i apreciate this
you got my sub for this. its 3am in the morning and I've watched the entire thing having so much fun. keep on with the good stuff
THOSE DOWNVOTES....GTFO...this dude is a legend
I love these malware analysis videos. You break stuff down to a fairly easy to understand level for most technical people.
I'm just getting into cyber security and I'm really enjoying your content, thank you.
That was epic dude!
Felt like a real rollercoaster. I can't believe you got to them within 24 hours of release.
So nuts.
I love that you used strings and am glad I'm not the only one who does. :-) It's a highly under-rated tool, IMHO.
Wow, that was a crazy ride! Thanks for taking us on the journey.
Dope analysis! The streets need this type of content. Keep it coming.
What a great catch! This is by far the most interesting video I've watched on UA-cam for a very long time. I love this of unedited video.
Been programming for a long time, but never really looked much into viruses and malware. Cool analysis. The authors sure work hard to make their installation as painless as possible.
59:06 love how scrolls past when looking at string in the executable "Offline Keylogger Started" "Online Keylogger Started" "Online Keylogger Stopped" "Offline Keylogger Stopped"
Yes John sees the key strokes and is like, "is this doing keylogging?"
Nice. Never seen someone crank through something like that. Cool man, cool!
I binge your videos every day all day at work. Gets me through the day and I learn some new/cool stuff.
I could not stop watching, especially considering I can follow the concepts but the syntax is my weakness.
I had a friend that did stuff like this and was always amazed. We fell out of touch and that's okay, I can just watch you do it now.
This was so fun to watch. The sketchy url was very funny, fitting pun on with the ‘holy cow’
Attack.jpg, that was hilarious
This series of decoding Malware is the best knowledge base for getting a feel for noobs like me. Please keep it coming. Thank you.
Really interesting video, thanks !! I'm impressed at the obfuscation job done on this malware it's impressive
Man I love these videos. As a junior network tech I love watching this, so interesting and entertaining!
From beginner hand-holding on picoCTF to obfuscating obfuscated obfuscation LOL. This channel has it all, thanks for the great content!
This is crazy. I've learned more about malwares in a few vids I saw from you, than the time I spent trying to get into the field years ago. I'm a fulltime dev now and have been working for over 7 years. Reminds me of my recent grad days where all I wanted was to understand this. Much easier to follow now, and damn, learning so much so quick now. Props to you.
as a computer science student, you make this profession actually seem fun. Thanks for re-kindling my interest in this field :)
I never write a comment under a video but I saw every single second and I really really loved it. Thanks for your video and keep doing it sharing your passion with us!
I love your videos which are not preplanned... It gives us an option for us to know how you actually resolves when you are stuck....
I still have no idea what's going on, but I enjoy these videos all the same. Thanks for the upload John.
Please mahn ... we need more malware analysis like this!! ... and also ... C source code analysis (something like that)
John: releases a video with malware analysis
Me after watching a video: *Lemme check real quick whether notepad.exe is running in the background or not in Task Manager*
Imagine using windows 🤔
@@benricok Imagine thinking that exploit-db had 0 results for Linux 🤔
@@Reelix I didn't even mention an OS? I am aware that Linux isn't perfect as so with every software product (opensource or not). The worst thing you can do to your security is to be over confident in your defense.
@@benricok Imagine being a pompous asshole. Some people want to, you know, play normal games on their computer.
@@theluckyscav3487 I mean linux gaming has come a long way, but it still needs some time to flourish
That was a great video. I don't know a whole lot about what you do, but it was super fun watching you do it. Thanks so much!
Just for the UA-cam algorithm to know, I love malware analysis series! keep them coming!!!!!!
Nice. I really impressed at final "detective" processing :) Keep it that way
Brilliant. You make malware reversing so fun to watch.
That's a rabbit hole if I've ever seen one haha great stuff man!
If only it (the rabbit holes) were rare. 😥
Follow the white rabbit!
As a prospective sw engineer, at ~54:00 that obfuscated spaghetti mess made me never want to be a malware analyst 🤣😂🤣 glad to have people with your mettle in this world
Totally enjoyed the video. It was an absolute rollercoaster ride. I love the way you present and explain the details in all your videos. And also none of your videos ever seem to be monotonous even when we are dealing with such mind boggling stuff because of the way you laugh and get excited when you crack/deobfuscate a piece of code. 😁 Thank you so much for taking the effort and sharing the awesome work😊
Knowing the internet is totally insecure and I should be scared of everything puts me to sleep at night. Thank you John!
Watched the whole thing from start to finish - loved it! Make more!
You know so much about so many things... I've learned so many things in the few videos I've watched so far. Super, super inspiring.
John - This is great content. I really am learning a lot watching you work these out. Keep it up! The masses demand more of this!
Keep on doing those Malware Analysis. It's really fun to watch and it's quite educative too!
Watching John in 1.75x speed was awesome. very entertaining and I learned stuff. Thank you
You make easy to understand videos as you break things down. i really enjoy them.
I have a vague understanding of coding and the way you work is easy to follow.
John, great interview in the Infosec OSINT podcast!
Makes me nostalgic for my coding days. Love figuring out the puzzle.
Did anyone told that to you, you're an genius buddy....
i even can't get off my eyes on this series.... amazing
Always learn something new watching your content!
This analysis had a more exciting climax than most Hollywood movies
I really enjoy lookin into this with your hand, and your happy face
I knew exactly what it was a few minutes of you scrolling few the strings!!! I feel proud! And thank you for making this video, I learned a lot.
Dude... That was solid. Loved it. Kinda dragged in the middle but I was invested enough I just jumped ahead maybe ten minutes before I was stuck back in. Nice nice so nice I had to say it twice, then one more time too.
Wow, that was awesome video. It is so nice to see you go through all the steps and thinking while deobfuscing. This RAT is kind of really scary for everything it can do. I would like to see more of this in the future! Keep up the good work
This was fabulous! I hope to see more!
Pls keep up the malware analysis videos! Its so fun to watch!
I’m watching this one year and one day later. Better than never.