Malware Decoding With CyberChef - Guloader

Поделиться
HTML-код
  • Опубликовано: 9 янв 2025

Комментарии • 6

  • @shamelessone1987
    @shamelessone1987 2 месяца назад

    I was just looking around for vids about how to analyze .eml files with cyberchef and I stumbled upon this. I didnt realize how much obfuscation played into the designing malicious code! You read through that so well!!

  • @bohanzhang4364
    @bohanzhang4364 11 месяцев назад +1

    Thx for the content, any plans to reverse the 2nd stage?

    • @A-Litte-Catnoreplay
      @A-Litte-Catnoreplay 11 месяцев назад

      yea that woud be cool

    • @EmbeeResearch
      @EmbeeResearch  10 месяцев назад

      Yes, Potentially in future :) I’d like to make some content on shellcode and this would be a good example

  • @yurilsaps
    @yurilsaps 11 месяцев назад

    Amazing content!! Keep with your nice job!! One question, how do hackers hide themselves behind dns if this service requires identification, credit card number, name etc?

    • @EmbeeResearch
      @EmbeeResearch  10 месяцев назад

      Thank you!
      I’m not 100% sure, but I would assume they use fake or stolen details to register the domains. They might also leverage the legitimate domains of machines/businesses that they’ve compromised :)