What is this "Cheat Software" actually doing?

Поділитися
Вставка
  • Опубліковано 6 лют 2025
  • I finally got a copy of the notorious cheat lab, and was able to find out, what it's actually doing.
    Follow me on Twitter - / atericparker
    Tools used:
    Arch Linux (host system)
    MITMPROXY (traffic inspection)
    bless (hex editor)
    Windows 10 (guest operating system)
    Disclaimer: The content in this video is for education and entertainment purposes to showcase the dangers of malware & malicious software. I do not encourage any form of illegal hacking, nor do I encourage the usage of game cheats, cracks or hacks.
    Cracks are sometimes shown to highlight the dangers of software piracy, my content is not intended to teach anybody how to pirate, or maliciously hack.
    More Malware Investigation Videos:
    → Cyberpunk 2077 Highly Compressed: • Video
    → The latest "NORD" Malware - Nordsecured: • The latest 'NORD' Malw...
    →🧧VIRUS WARNING🧧 NEW Optifine for Minecraft 1.16 SCAM: • 🧧VIRUS WARNING🧧 NEW Op...
    → The wilkreate UA-cam stealer virus that started this whole trend: • Fake sponsor DESTROYS ...
    Much of the music in my videos comes from the UA-cam audio library, especially this amazing music creator: / @patrick-jordan-patrikios .
    Outro Music
    Track: Lost Sky - Where We Started (feat. Jex) [NCS Release]
    Music provided by NoCopyrightSounds.
    Watch: • Lost Sky - Where We St...
    Free Download / Stream: ncs.io/WhereWeS...
    (C) Eric Parker 2021

КОМЕНТАРІ • 415

  • @rutarita90
    @rutarita90 9 місяців тому +1483

    it would've been easier if windows didn't send millions of requests to ms servers...

    • @3ofSpades
      @3ofSpades 9 місяців тому +85

      And I would have gotten away with it if it weren't for the red spies in the base!

    • @NicoTheCinderace
      @NicoTheCinderace 9 місяців тому +53

      @@3ofSpades A red spy's in the base?!

    • @muscletype2
      @muscletype2 9 місяців тому +45

      ​@@NicoTheCinderaceWe need to protect the briefcase!

    • @MacGuffin1
      @MacGuffin1 9 місяців тому +7

      or ppl knew how to use filters...

    • @NicoTheCinderace
      @NicoTheCinderace 8 місяців тому +17

      @@muscletype2 Yo, a little help here?

  • @esomnx
    @esomnx 9 місяців тому +339

    Thank you for investigating cheat lab! I've been wondering what the malware embedded into it does, and now I finally know what it actually does!

    • @Fizcakesprite
      @Fizcakesprite 9 місяців тому +7

      Why are people after me?

    • @bubgamingandvlogs3870
      @bubgamingandvlogs3870 9 місяців тому +46

      @@Fizcakesprite what

    • @Fizcakesprite
      @Fizcakesprite 9 місяців тому

      @@bubgamingandvlogs3870 Balls

    • @ValipPowa
      @ValipPowa 9 місяців тому

      @@Fizcakesprite it's blatant almost every cheat has a tiny bit of malware in it even paid ones 🙂the cheat developers are just addicted to embedding malware at every stop

    • @elGuille_uy
      @elGuille_uy 9 місяців тому +7

      @@Fizcakesprite what

  • @AlfieLikesComputers
    @AlfieLikesComputers 9 місяців тому +1516

    Just look at all the packets that windows is sending, windows itself is spyware lol

    • @EricParker
      @EricParker  9 місяців тому +526

      The main culprit is every time you open the start menu and type anything, that's all going to bing servers. You can disable that with a registry tweak.

    • @stacyroper
      @stacyroper 9 місяців тому +6

      @@EricParker Could you make a video on that? thanks.

    • @francomino-kt4wo
      @francomino-kt4wo 9 місяців тому +51

      @@EricParker how I can do that? you should make a video about that :)

    • @wtfrare
      @wtfrare 9 місяців тому +10

      @@EricParker disabling search indexing?

    • @_Bruhens_
      @_Bruhens_ 9 місяців тому +28

      disabling telemetry i think, that option to disable it is in winaero tweaker

  • @Nas_Allie
    @Nas_Allie 9 місяців тому +365

    You know you can trust a guy when you see him open up the ol Firefox

    • @Stix_Zidinia
      @Stix_Zidinia 8 місяців тому +21

      Yeah, the same devs who think transitioning kids is OK. I'm sure they have your best interests in mind. Most chromium based browsers are better.

    • @Penguin_BTW
      @Penguin_BTW 8 місяців тому +126

      @@Stix_Zidinia You seem obsessed with trans people. They are always on your mind.

    • @gmdzbanwic
      @gmdzbanwic 8 місяців тому

      ​@Penguin_BTW they would be on your too if you had firefox personally after using apple device way more anal porn populated hub website so. Maybe there is certain agendas

    • @HexSaber
      @HexSaber 8 місяців тому +73

      @@Stix_Zidiniaso do you have anything to actually add to the conversation or

    • @idk.-.d
      @idk.-.d 8 місяців тому +4

      ​@Stix_Zidinia Even though thinking that is being clowns, it doesn't have any connection to the confidence.

  • @shardzzexe
    @shardzzexe 9 місяців тому +277

    This dude is an antivirus lol

    • @hydradragonantivirus
      @hydradragonantivirus 9 місяців тому +6

      No I'm

    • @SparselyUsed
      @SparselyUsed 8 місяців тому +5

      This right here. This guy's apparently just Symantec Endpoint Protection, but in person form.

  • @BillyBobJoeMoma
    @BillyBobJoeMoma 8 місяців тому +52

    I would love to see how you set up the VM, seems very interesting for learning how to reverse engineer rats

  • @MiDnYTe25
    @MiDnYTe25 8 місяців тому +4

    Ngl finding the rare ultrawide video on youtube as an ultrawide user is an unexpected feeling of bliss, didn't even realize until I was 2/3 the way through lol

  • @Awesomium3
    @Awesomium3 9 місяців тому +143

    i didnt know you could somehow get out of a hex a screenshot, great job man!

    • @ValipPowa
      @ValipPowa 9 місяців тому +34

      lol how do you think images get saved they are in binary computers dont use a magic! alot of things on your computer right now can be viewed in hex format🙂 hex editor is a great tool

    • @cesj1
      @cesj1 9 місяців тому +28

      ​@@ValipPowathat 1st sentence is fucking crazy.

    • @krazidev1133
      @krazidev1133 9 місяців тому +29

      @@cesj1 ong bro had a stroke while typing that

    • @henzk
      @henzk 9 місяців тому +3

      @@krazidev1133 tf you mean you had a stroke while typing that? you didn't type that 💀this comment section is cooked ngl

    • @NeoNickz
      @NeoNickz 9 місяців тому

      ​@@henzkyou're illiterate lmfao

  • @Sypaka
    @Sypaka 8 місяців тому +23

    The Lua file you opened was Lua bytecode. It is Lua, but in a compiled form.

  • @MintleafCakes
    @MintleafCakes 9 місяців тому +21

    this channel is great, you remind me a lot of danooct1, its like ive discovered him again lol. i think its mostly the voice but also the realm of content you both make.

  • @NoodleHD
    @NoodleHD 9 місяців тому +58

    we love eric virus analasis

    • @kat_cit
      @kat_cit 9 місяців тому +1

      best comment, been watchin for 3 years now

  • @SteenSneeze
    @SteenSneeze 9 місяців тому +130

    Please do a tutorial on the Network Monitoring.

    • @dogyX3
      @dogyX3 9 місяців тому +3

      Yes please

    • @ZondGrief
      @ZondGrief 9 місяців тому

      I am not a 100% sure but I think you can do that with a program called Http-toolkit

  • @3RR0RNULL
    @3RR0RNULL 9 місяців тому +27

    I’m not sure what to say other than that this is cool, and I hope to see more like this in the future. I’m gonna go watch a bunch of your videos.

  • @jmvr
    @jmvr 8 місяців тому +14

    LuaJIT is not the payload, the .LUA file is. JIT means "Just In Time", which makes certain programming languages into something like Java, where a VM or JIT Interpreter can run some compiled code on the machine.
    Basically, the malware just used the JIT Interpreter to run that compiled .LUA file

    • @raskr8137
      @raskr8137 6 місяців тому

      Lua bytecode is stored in ".luac" files, not ".lua", and this bytecode can be run both by the JIT and vanilla lua. "JIT" really has nothing to do with this at all, it affects interpreter internals but from the outside it's identical to non-JIT lua (it's intentionally ABI compatible).

    • @jmvr
      @jmvr 6 місяців тому +2

      ​@@raskr8137 I just commented this because he ran the LuaJIT program by itself, but it's supposed to be ran with the Lua file as an argument. I don't believe he checked if he could get the Lua bytecode back into a readable Lua script. It seems like he believed that the LuaJIT executable was the payload, rather than it just being the one that runs the bytecode, which is the actual payload

    • @jmvr
      @jmvr 6 місяців тому

      ​@@raskr8137 also file extensions can be changed, and I called it bytecode because it looks non-human readable, as well as being ran by "LuaJIT", where JIT runs bytecode-compiled languages

  • @pandrevanc
    @pandrevanc 9 місяців тому +20

    Let's all love lain

  • @d0tmaxx376
    @d0tmaxx376 9 місяців тому +26

    Can you make a tutorial on how to setup the proxy that captures packets?

  • @TerrisLeonis
    @TerrisLeonis 8 місяців тому +2

    What's really interesting about this is that the "malicious exe" here actually appears to be legit. It's just the Lua runtime. That means it's a known good executable, which won't be detected as malicious - because, on its own, it's not.
    On the other hand, the Lua file is definitely malicious. It's compiled Lua bytecode, rather than Lua script, which means you'd need to decompile it to understand it. Normally, Lua reads a script and internally compiles it into bytecode before running it, but you can also just supply precompiled bytecode and Lua will recognise the bytecode by the file signature, it then skips the compilation step, and runs it as-is. (Python can do this too, it's not just Lua)
    So, the .lua file is the actual malware. Because it's not an executable but is interpreted, this gives it an opportunity to evade anti-malware solutions, which would just see it as a data file while the exe in the same folder is considered trusted.

    • @xxzombiekillerxx9549
      @xxzombiekillerxx9549 8 місяців тому

      so couldn't malware companies like malwarebytes or kaspersky just make a list for any if all lua files and some how read the bytecode or script since this is apparently how people are getting around that?

  • @Frozenies
    @Frozenies 8 місяців тому +4

    didn't know you were uploading again, love the content!

  • @prosperogaming3036
    @prosperogaming3036 9 місяців тому +27

    If i had to guess its possible those pixels at the top of the image are possibly pixel steganography hiding some form of data such as username

  • @sfisher923
    @sfisher923 8 місяців тому +2

    11:06 - That black box mentioned in editing could be a encryption measure as Lain and the Desktop icons were nowhere to be found in the decryption but were there when you ran Cheat Lab at 6:23 and the instructions are for the C&C server to remove the box and send it to the author if I were to guess

  • @L1ghtInTheDark
    @L1ghtInTheDark 9 місяців тому +12

    Was that a Fnaf 3 refrence?

  • @stickuhram
    @stickuhram 8 місяців тому

    cool video dude. I love that MITMPROXY software, that looks super useful - reminds me of WPE Pro back in the day.

  • @mapelsiroup
    @mapelsiroup 9 місяців тому +6

    very informative and prompts me to check network calls on my own machine hehe, very cool config which you have there would love to know more maybe a video on how to make a "hidden" virtual machine would be super nice or at least how you would approach hiding virtualisation

  • @austist
    @austist 8 місяців тому +1

    this was an awesome watch and got me messing around with MITM inspecting everything lol.
    also youre the first half british half american sounding person ive ever heard. (not trying to be mean lol)

  • @teemops7167
    @teemops7167 9 місяців тому +4

    I'd be curious about how to stealth a VM from software detecting it too

  • @ratboygirl
    @ratboygirl 9 місяців тому +3

    i know next to nothing about computers but even i could follow this with basic knowledge of how malware works :) good job super interesting

  • @lionkor98
    @lionkor98 8 місяців тому +1

    The rest of that file is also part of the image, that's why the image was mostly black. To get this, you can just remove the header before the magic, the rest is your image. It probably sends screenshots because they may contain a lot of sensitive info.
    The lua was in bytecode, you can certainly disassemble that back to lua code if you try ;)

  • @tutacat
    @tutacat 2 місяці тому

    Apparently the executable is "709"
    There was another 42 4D ("BM") at the end of that bitmap file that was cut off, maybe separate windows or part of the same file

  • @hirrunio
    @hirrunio 9 місяців тому +14

    Loving the Lain wallpaper ;)

  • @daedelous7094
    @daedelous7094 7 місяців тому

    Everyone time you see a hacker in a game you just think "These guys are idiots" when you see what the software is actually doing.

  • @Yotes_
    @Yotes_ 8 місяців тому +1

    I endorse cheating....
    In single player games.
    You deserve everything you get after trying to cheat in multiplayer games.

  • @hawklew
    @hawklew 8 місяців тому

    you know what would be funny
    somehow making viruses believe my actual machine is just a virtual machine
    so the virus just ignores it
    lol

  • @losttownstreet3409
    @losttownstreet3409 8 місяців тому

    What's the difference between cheat software and malware?
    - Both need to use anti detection on kernel level (for multiplayer and gotcha games)
    - Both need to modify the system
    - Both need to be dynamically updated (artmoney not because you must search yourself in the game code)
    If you write a cheat for modern games, you use the same code as malware. There is no other way as to dynamically update the payload if you want to provide a cheat service for modern games.

  • @theshark9001
    @theshark9001 8 місяців тому +2

    how did you get the packets being sent from a qemu VM? I am curious because that seems VERY useful and for a while, I have been wanting to do the same thing you are doing in this video

    • @someguy4915
      @someguy4915 8 місяців тому +1

      Use vSphere or Hyper-V and this is a default feature (Mirror Ports).

  • @borat1
    @borat1 9 місяців тому +2

    Couldn't you check ACPI table to detect vms? Not sure if you can get around that with vmware products

  • @ardwetha
    @ardwetha 9 місяців тому

    That's the reason, why you either only download from trusted sources, or use open source software like cheat engine, or you use a seperate computer and dont care if yo have a virus

  • @boblol1465
    @boblol1465 7 місяців тому

    that lua file might be luajit bytecode, you can decode it
    and you can see if it's bytecode if it starts with \27 (the escape char, not literal \27)

  • @thesupercomputer1
    @thesupercomputer1 8 місяців тому +1

    Du you have any resources on hand to stealth a VM like the one you used?
    Would be handy in some situations.

  • @vladislavkaras491
    @vladislavkaras491 8 місяців тому

    It was interesting to see, how malfare functions!
    Thanks for the video!

  • @cibles
    @cibles 9 місяців тому +3

    Thank you for another wonderful vid!

  • @666nxvxr
    @666nxvxr 9 місяців тому

    underrated channel, great video!

  • @ronpaul9172
    @ronpaul9172 7 місяців тому

    Love to see new people trying to learn on the fly. :) Welcome to the malware world, bud. ;)
    The lua script isn't a cloaking technique, it's just a prescript to pull the .exe which is then guised as a .dll.

  • @heckerhecker8246
    @heckerhecker8246 8 місяців тому +1

    Hey, I built cheat engine 7.5 from source;
    I've ran it a few times, and nothings gone wrong;
    Though I suspect it still might be doing something, my pc has gotten slightly slower, but no malware found;
    Is it safe?

    • @felicityc
      @felicityc 8 місяців тому +3

      cheat engine is not cheat lab, not related, cheat engine is a legit piece of utility

    • @heckerhecker8246
      @heckerhecker8246 8 місяців тому

      @@felicityc thanks

  • @dinky_474
    @dinky_474 8 місяців тому

    I'd love to see you make some tutorials in the future!

  • @WoollyOwl
    @WoollyOwl 9 місяців тому

    I think that strange top bar isn't secret data, it looks a lot like the missing part of the taskbar. Just to the left a bit and shortened

  • @hamburger_eatspie
    @hamburger_eatspie 8 місяців тому +1

    I love your videos even though I don’t understand most of the stuff you say ❤️

  • @captheobbyist6434
    @captheobbyist6434 8 місяців тому

    it's pretty funny that people think of privacy in the internet, while windows or a browser they're using is sending tons of requests to various servers.
    im not only talking about "evil" bing or windows, just about overall software which connects to the internet.
    there could be some operating systems which dont do that, like distros of linux

    • @ФеофанЭтополедолжнобытьзаполне
      @ФеофанЭтополедолжнобытьзаполне 8 місяців тому

      Nah, they all do that. You can only protect youself by mitming your connection and writing up huillion of filters. And there basically goes your internet, because you'll inevitably end up switching to whitelist mode, blocking everything, including all kinds of "cloud" solutions. I can't even see avatars or proper nicknames on youtube because googlagol uses its spyhosts to deliever code that loads those. It's a pain even for cypherpunks, let alone normies, so no, no linux distro will ever do this the proper way. Also you will r**ed with captcha.
      Funniest thing is that goolagol still knows a lot about me. All it takes is to crossreference activity and analyze what I consume and what I produce online. You are 100% trackable and identifyable until you are completely silent (emit no data) and use disposable internet endpoints in order to consume data. No distro can regulate this for you.

  • @pilottim136
    @pilottim136 9 місяців тому +13

    how did you disable the virtualisation thing so the VM doesnt know that its in a VM?

    • @someguy4915
      @someguy4915 8 місяців тому +2

      You don't, most software will instantly recognize that.
      Software can look at the actual used hardware, which unless it's enterprise-grade, is usually virtualized stuff.
      1: 'CPU is modern, virtualization is disabled' -Suspicious.
      2: 'VMXNET network adapter.... (or similar for other hypervisors)
      3: 'ACPI driver is one for VMs'...

    • @pilottim136
      @pilottim136 8 місяців тому +1

      @@someguy4915 makes sense

  • @ethan1898
    @ethan1898 9 місяців тому +2

    great informative video. very cool to see the binary conversion into png, was interesting to see what they were looking for.

  • @Flobbie
    @Flobbie 8 місяців тому +1

    And you don't seem to understand 6:44

  • @kingy3577
    @kingy3577 9 місяців тому

    i have no clue what bro is talking about, yet somehow still watched the entire thing

  • @justaneric
    @justaneric 9 місяців тому +2

    hey my name's eric too
    also you can likely use a code analyzer to see the operation of an exe's process.
    at 10:39 this looks like hex data
    hope this helps ;)

  • @ruinfox4108
    @ruinfox4108 8 місяців тому

    Can you liink the thing you used to actually tell you what all the traffic means no encryption? i noticed it was the one thing you didnt include.

  • @gerarderloper
    @gerarderloper 8 місяців тому

    Would love to know what KVM/Host XML tweaks you did to convince windows its not a VM.
    I have only done the basic stuff myself. I don't really play online games and never cheat, just doing the VM thing because I love Linux and well, I could. lol

  • @m4g3n74
    @m4g3n74 9 місяців тому

    Am interested in the setup of the monitoring. There are a couple of uses I want to try out

  • @volkingdeath5312
    @volkingdeath5312 9 місяців тому

    Really interesting analysis, found another gem on youtube

  • @camirow
    @camirow 8 місяців тому

    Hey how did you setup mtimproxy to capture the traffic of applications? Mine only displays data sent by browser, discord, games etc but applications i download off the internet and ran doesn't show up in mtim even tho ive set the proxy server in settings and downloaded their cert. Would appreciate if you could tell me how you set yours up or a guide somewhere thanks!

    • @camirow
      @camirow 8 місяців тому

      Some third party applications ive downloaded that i know/wont function without connecting to their servers etc does not show up in mtim proxy

  • @Lemonesms
    @Lemonesms 8 місяців тому

    Hi, if possible could you tell me how you made the virtual machine think it isn't, if so this would be very useful Thank you!

  • @VVVibez
    @VVVibez 9 місяців тому +1

    that is the most sketchy cheat software I've ever seen

  • @shrekrab
    @shrekrab 8 місяців тому +1

    How do you make a stealthy VM?

  • @Seany1616
    @Seany1616 7 місяців тому

    can someone explain to me what this did other than send a screenshot to somewhere. ig i'm missing the point of this malware.

  • @Gimmy1337
    @Gimmy1337 6 місяців тому

    Very cool video to see even if i didn't knew cheat lab existed

  • @randomdude12370
    @randomdude12370 8 місяців тому

    Would you be able to show us how you create such a VM and/or the mitmproxy with the custom ssl cert?

  • @BubbleGumCanDevelop
    @BubbleGumCanDevelop 9 місяців тому

    the letters you where seeing are opcodes, better known as shellcode, you can directly execute them from programs without any decoding needed.

  • @Niksa30171
    @Niksa30171 8 місяців тому

    what is the program to the right where u can see the stuff and all of that.

  • @strandedice5145
    @strandedice5145 8 місяців тому

    Omg I installed cheat engine like 6 years ago to change values on fnaf ultimate custom night, and since then, my computer has gotten slow and gotten blue screens of death for like no reason at all. Should I be concerned? What do I do?

    • @felicityc
      @felicityc 8 місяців тому

      cheat engine is not the same as cheat lab. cheat engine is not malicious software. cheat engine will get you instabanned if you try to change the memory on a game with anticheat in progress. the point of a cheat like this is that it uses some ridiculous workarounds and disguises itself so the anticheat thinks nothing is wrong. while also giving you malware

  • @StarzZoneGames
    @StarzZoneGames 8 місяців тому

    please share a video of full setup , thank you in advance

  • @BigMan7o0
    @BigMan7o0 8 місяців тому

    I was quite literally mid making a comment about if you could show us how to set up the network monitoring when you mentioned it at the end lol. Personally I would love to know how to do it so I can have the peace of mind of being able to see everything my pc does. I've tried wireshark before but it was a little above my paygrade xD

  • @gtasanandreas684
    @gtasanandreas684 9 місяців тому +4

    Also, lain my beloved

  • @TheInfamousKenny
    @TheInfamousKenny 8 місяців тому

    I like to test malware samples on VMs and every time I worry about the virus some how finding its way out of the VM into my actual computer. Surely VM software must have some kind of protection against that? Or I could be wrong. I mostly use VirtualBox but sometimes I use VMWare if an OS refuses to work in VirtualBox for some reason or other.

    • @felicityc
      @felicityc 8 місяців тому

      it can happen sometimes, but it's pretty rare.
      just don't use shared folders, and make sure hyperv isnt compromised somehow via mods or tweaks
      but if you are going to release serious malware or a lot at once, cloud vm is the way to go, or a dedicated machine

  • @dedogospod
    @dedogospod 6 місяців тому

    can you do a video how to make a virtual machine this stealthy?

  • @javierdz
    @javierdz 8 місяців тому

    good video mate!

    • @DaFluffyBear
      @DaFluffyBear 8 місяців тому

      nice windows ctac pfp, im an endermanch fan too

  • @1qxd
    @1qxd 8 місяців тому

    the lain bg really shows you this guy knows what they're doing

  • @pixo2000
    @pixo2000 9 місяців тому

    bro thx so much! 1st video i can watch fullscreen without black borders. i also use ultrawide

  • @MultiTrackDrifto
    @MultiTrackDrifto 8 місяців тому

    Did you do a man in the middle on yourself to view the packets

  • @SunTzu_0
    @SunTzu_0 8 місяців тому

    Does it by hand still proceeds to be better then avast

  • @amongussuss341
    @amongussuss341 9 місяців тому

    im curious about if you have any specific special configuration for ur vm, i see ur using virt-manager

  • @Jommy161
    @Jommy161 9 місяців тому

    What is your vm config? How do you get your vm to look real?

  • @Xanaxly
    @Xanaxly 9 місяців тому +19

    why does he sound like tristan tate

    • @Jolvp
      @Jolvp 9 місяців тому +12

      English accent mixed with a USA accent

    • @PixelatedBrayden
      @PixelatedBrayden 9 місяців тому +3

      Top T

    • @Twobrosk
      @Twobrosk 8 місяців тому

      because he is

  • @TURTLETIMEGAMINGOFFICIAL
    @TURTLETIMEGAMINGOFFICIAL 9 місяців тому

    Id love to see that network tool more !

  • @sdliuber
    @sdliuber 2 місяці тому

    How do you delete the app?

  • @Stratxgy.
    @Stratxgy. 8 місяців тому

    youtube videos advertising “cheat lab” have been everywhere in the past few months and they are all just the same video with different music and ai thunbnails

  • @ThatGuyAmir
    @ThatGuyAmir 9 місяців тому +3

    Hi Eric, I just found out your channel I actually love your work could you please make a tutorial or redirect me to a existing one on how to make a secure VM like you did TYSM

  • @Jessycakeboy
    @Jessycakeboy 9 місяців тому

    I would love a tutorial on how to set up the network monitor

  • @sotearz
    @sotearz 9 місяців тому +1

    Nice stuff g

  • @Garloth1
    @Garloth1 8 місяців тому

    McAfee (lol) has a full wroteup, "Redline Stealer: A Novel Approach"

  • @WalnutBun
    @WalnutBun 8 місяців тому

    Where do you get your virus samples from, btw?

  • @Cyiatic
    @Cyiatic 9 місяців тому

    Thank you for your dynamic analysis of Cheatlab, Mr. Parker! Is there any chance we could all get a tutorial video on your network capture setup?

  • @u2ef
    @u2ef 9 місяців тому

    so is cheat engine fine or is cheat lab and engine the same thing?

    • @AnnoyingPyroMa1n
      @AnnoyingPyroMa1n 8 місяців тому +1

      Cheat Engine is fine, Cheat Lab is the problem

  • @Soup69God
    @Soup69God 8 місяців тому

    Howd you set up your stealth vm?

  • @ThompYT
    @ThompYT 8 місяців тому

    How can you disguise a VM like that?

  • @tonimorton
    @tonimorton 8 місяців тому

    probably uses screen shots in c2 for user previews. Basically imagine UA-cams videos layout but each thumbnail is a Screencap

  • @norwegiansmores811
    @norwegiansmores811 7 місяців тому

    so this malware is basically working the same way MICROSOFT RECALL was intended to with the screenshots. lmao

  • @frogrockrust
    @frogrockrust 8 місяців тому

    can you look at "star multi tool"?

  • @zebraforceone
    @zebraforceone 8 місяців тому

    If the free version rinses you this much, imagine what kind of things they'd feel comfortable doing to paying users.

    • @felicityc
      @felicityc 8 місяців тому

      don't pay -> (cheats: you are the product. windows: you are the product.)
      pay -> (cheats: you get a product. windows: you are still the product.)
      its funny

  • @EpickyHrac
    @EpickyHrac 9 місяців тому

    how you setuped a netweok monitor for vm? i use too arch btw

  • @hangup8629
    @hangup8629 8 місяців тому

    id love it if these kind of videos spent a little more time actually reverse engineering the payload, and not just looking at some surface level network traffic that rarely tells you anything interesting

  • @harrythezomby
    @harrythezomby 8 місяців тому +1

    Hey Eric, just out of curiosity - do you add anything special to ur VMs xml to protect the host from vm escape malware and that sorta stuff?

    • @someguy4915
      @someguy4915 8 місяців тому +3

      Probably not, since VM escaping malware is so insanely rare and dependent on being run on the right version and type of hypervisor that it's hardly a concern.

  • @sputnikone1407
    @sputnikone1407 6 місяців тому

    i downloaded cheat lab on my real computer a year ago. I scanned it a few months after, and it had PUP malware.

  • @SchlickSteve
    @SchlickSteve 8 місяців тому

    How do you set up the vms so no one can detect it?

    • @someguy4915
      @someguy4915 8 місяців тому

      You can't, you can partially hide it, but by hiding it you usually just make it more obvious.
      Like trying not to be seen by a police officer by covering your face with a ski-mask...