Malware Analysis of a Password Stealer

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024
  • In this video we dive into the analysis of Poulight malware, which is a .net based password stealer.
    Following are the hashes of the files being analyzed:
    Step1.lnk: 32febef64410a6fcff07a6f95f51c25506c291ef13bdaa0937e2b9ce08d2d406
    Step2.exe: 265cf03cb735b976fa1ad587bdc35f0bddfc00f92455c9b804f01468a7e51c66
    Malware Analysis Course Link: courses.null-c...
    Academy Link: ask-academy.live/
    Please provide feedback in the comments.
    To continue the conversation hit me up on twitter:
    🐦 Twitter - / nu11charb

Комментарии • 16

  • @xoreaxeax2885
    @xoreaxeax2885 3 года назад

    Great Analysis !!!!
    Expecting more content from here..

    • @ahmedskasmani
      @ahmedskasmani  3 года назад

      Thanks a lot for the feedback, means a lot. Planning to create similar content soon.

  • @AbdallahMohamed-py5dz
    @AbdallahMohamed-py5dz 3 года назад

    Keep up the great work

  • @chaitanyaghorpade830
    @chaitanyaghorpade830 3 года назад

    Excellent analysis.Please analyse other .net stealers like Agnet Tesla Formbook,etc

    • @ahmedskasmani
      @ahmedskasmani  3 года назад +2

      Thank you very much, planning to release similar content in the near future.

    • @disfiguredloafers
      @disfiguredloafers 3 года назад

      Ditto. Great vid.

  • @MemesandLeague
    @MemesandLeague 3 года назад

    I learn a lot from your videos. Do you accept malware samples(or suspected malware samples) to do analysis?

    • @ahmedskasmani
      @ahmedskasmani  3 года назад

      Hi Harrison, thanks a lot for your comment. I am still learning reverse engineering, I can accept a sample cant promise whether i can answer all questions related to it.

  • @bdsrahul3248
    @bdsrahul3248 Год назад

    excellent work

  • @demi1790
    @demi1790 2 года назад

    Hi sir. Can you help me with yoqs ransomware come with redline stealer. I just want to ask some questions. How does this work will they copy the files from the infected pc to c2c before encryption or will they encrypt the files first then after decrypting the files then they will transfer it to the c2c? Hope to hear from you. Thank you.

  • @yogeshbane9647
    @yogeshbane9647 Год назад

    Good Work. Keep Doing...!! Pls can you do analysis of IcedID malware ?

    • @ahmedskasmani
      @ahmedskasmani  Год назад +1

      Analysis of ICEID Malware Installer DLL
      ruclips.net/video/wMXD4Sv1Alw/видео.html

    • @yogeshbane9647
      @yogeshbane9647 Год назад

      @@ahmedskasmani Thanks a lot..!

  • @madarauch00
    @madarauch00 3 года назад

    Sir what does step 1 do ! If victim opens that TXT file he might aware of it