JScript Deobfuscation - More WSHRAT (Malware Analysis)

Поделиться
HTML-код
  • Опубликовано: 12 июл 2021
  • If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer smart completions and documentation. www.kite.com/get-kite/?... (disclaimer, affiliate link)
    For more content, subscribe on Twitch! / johnhammond010
    If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
    PayPal: paypal.me/johnhammond010
    E-mail: johnhammond010@gmail.com
    Discord: johnhammond.org/discord
    Twitter: / _johnhammond
    GitHub: github.com/JohnHammond

Комментарии • 134

  • @amstevenson
    @amstevenson 3 года назад +98

    Hacker: Turns code into obfuscated alphabet soup
    42:40 Also hacker: Adds helpful code comment to let you know this line is for Firefox

  • @mycotina6438
    @mycotina6438 3 года назад +21

    I love it so much how you speak out loud what you're thinking as you work through the code. I think this kind of video is a lot more useful than tutorials, because we get to see the thought process and from where the ideas come from trough the trials and error.

  • @jesseramsell1895
    @jesseramsell1895 3 года назад +41

    "What is that, Jurassic Park? I should know, I'm John Hammond." i died 😂

    • @rrittenhouse
      @rrittenhouse 3 года назад +1

      I never even realized the similarity on the name LOL. I've even made replica John Hammond Cane's for people... I should have caught that 🤣

  • @Irisilol
    @Irisilol 3 года назад +42

    When John goes "OH NOOOOOOO" you know the code is evil.

  • @litmussales9750
    @litmussales9750 Год назад +1

    I'm happy seeing you having fun with my codes. I love that part where you said OMG!!!

  • @ChymekJR
    @ChymekJR 3 года назад +3

    Your work inspires me! This is so cool

  • @vexraill
    @vexraill 3 года назад +1

    These are always so fun to watch, thanks for sharing your research with us!

  • @slybandit8117
    @slybandit8117 4 месяца назад

    That was some slick coding to get those vars into the correct places! Well done sir, stuff like that is why I love this channel!

  • @BlackDragonCZ_alt
    @BlackDragonCZ_alt 3 года назад +22

    23:52 john think: "John stop using python" Me: "John keep using python, thanks" :D

  • @KeithGriffiths
    @KeithGriffiths 3 года назад

    Great video John. Good walk through.

  • @DahlFreeman
    @DahlFreeman 3 года назад

    Great video!!! So much fun to watch

  • @samuelmiller1691
    @samuelmiller1691 3 года назад +7

    God I love this. I started watching your videos thanks to the RUclips Algorithm and had no idea what you are doing. Now I am starting to pick up on things here and there. More more more!

  • @bendavis8461
    @bendavis8461 3 года назад +1

    Oooo woow Malware Analysis, great stuff.

  • @pbezunartea
    @pbezunartea 3 года назад

    Great video! Amazing job!

  • @rungoranga6341
    @rungoranga6341 3 года назад +1

    Malware Analysis -videos are the best. 👍

  • @hunterbodell1129
    @hunterbodell1129 3 года назад +40

    I hate that these are so good that I wake up at 6 for them

    • @murkdurk8961
      @murkdurk8961 3 года назад +2

      You might need to rethink your priorities🤭

    • @alexlefevre8226
      @alexlefevre8226 3 года назад

      I don't wake up early to watch, but I do wake up to schedule the download, automagically chop the resolution down a bit, and finally upload to a part of my cloud storage where I store every one of these for the future. Kinda silly... But I am using these videos as a set of walkthroughs and have learned an "asston" so far. John does such a good job with these! His ah-ha moments have become the center of mass of which I orbit around.
      Keep it up John... Please!!! Although I know you were busy with the huge ransomware attack recently. Your name was in probably a dozen of the 15 I read. As if I didn't already respect the crap out of you

    • @Cavemannnnnn
      @Cavemannnnnn 3 года назад

      @@murkdurk8961 Nah, completely agree with him

    • @murkdurk8961
      @murkdurk8961 3 года назад

      @@Cavemannnnnn not saying this isn't important, but if you set your alarm to wake up for this in the morning, you might need to get a job

    • @Cavemannnnnn
      @Cavemannnnnn 3 года назад

      @@murkdurk8961 I wake up before 6:00 most days regardless of a video or not, and what does having a job got to do with watching anything xD

  • @sebastianinnez3395
    @sebastianinnez3395 3 года назад +1

    surely John teaches us HOW to obfuscate, looks awesome!

  • @sjslife
    @sjslife 3 года назад

    I fookin love u J, loads of love from UK

  • @fordorth
    @fordorth 3 года назад

    This was a great video... very fast!

  • @dustyboyle
    @dustyboyle 3 года назад

    Thanks for the video. Very cool

  • @johtodev
    @johtodev 3 года назад

    love these videos

  • @Roxas99Yami
    @Roxas99Yami 2 месяца назад

    great video 10/10 this helped me a lot deobfuscate a .js script i ripped from a site

  • @jannikmeissner
    @jannikmeissner 3 года назад +7

    At 39:38 I was like "yeees I did suspect 2031 would be the port the C2 server is running on" and it felt sooo good when this suspicion was met.

  • @cheshirecat6519
    @cheshirecat6519 3 года назад +1

    I don’t know **** about programming language and malware decoding and reverse engineering and stuff but It’s the 5th video I watch this week on your channel. Just saying.

  • @benjaminthelen1413
    @benjaminthelen1413 3 года назад +26

    Does anyone besides me else just watch him even though you have no idea what hes doing?

    • @1FelixxileF1
      @1FelixxileF1 3 года назад

      Same

    • @justinboss4131
      @justinboss4131 3 года назад

      @@1FelixxileF1 same here buddy

    • @joancasals4365
      @joancasals4365 3 года назад

      same here

    • @StreuB1
      @StreuB1 3 года назад

      Yep, absolutely no idea what he's doing but its awesome to watch brilliant people work their jam.

    • @codydietrich4246
      @codydietrich4246 4 месяца назад

      Same here, but he makes me wanna learn!

  • @snake1980eyes
    @snake1980eyes 3 года назад +11

    that filename actualy is from romanian language and it translates to INVOICE in english

    • @phyotyla
      @phyotyla 3 года назад

      Apparently the same in Swedish and Spanish among others

  • @LouisSerieusement
    @LouisSerieusement 2 года назад

    I think you were slightly peaking your audio interface sometimes
    But thank you so much, your videos are very informative !

  • @happyked
    @happyked 3 года назад +1

    Great content as always. Are you planning to make a video about Kaseya and REvil?

  • @erin1569
    @erin1569 3 года назад +3

    Are people really complaining about python? It's incredibly comfy. It's often as simple as saying: "Jarvis, convert this code into recognizable commands", but with a few extra words.

  • @mustafaismail5773
    @mustafaismail5773 3 года назад

    too inspiring, despite I'm in totally other field of work actually now I'm involved in my free time in coding with python & analysis of C applications since I started watching you almost one year ago.
    High respect brother keep it up always !!

  • @BloodBornKnight
    @BloodBornKnight Год назад

    The king in cyber security huge fan.

  • @larziel7107
    @larziel7107 3 года назад +6

    Thanks to you I'm trying to learn Python myself! :)

  • @gdk111
    @gdk111 3 года назад

    Thank you John, really interesting 😊

  • @ibrahemtaha8177
    @ibrahemtaha8177 3 года назад +3

    Many thanks for sharing with us all your amazing videos, John!!
    Could you please share with us Roadmap videos in which you tell us how to become Expert in Malware analysis \ Exploit engineers, from zero to hero, from beginner to Super advance!
    BTW, are the roadmaps for Malware analysis VS Exploit engineers different!? maybe a video for that? :)

  • @nordgaren2358
    @nordgaren2358 3 года назад

    Great reference to Jurassic Park!

  • @kaihuang5420
    @kaihuang5420 3 года назад

    no way. I am literally learning OSEP materials chapter where they go over Jscript and C#.. The big data has gotten me

  • @jkobain
    @jkobain 3 года назад

    No, the syntax highlight in Sublime Text was working fine, the problem was in escaping borderline quote symbols, for instance.

  • @Colaholiker
    @Colaholiker 3 года назад

    Seeing this, I am so glad that my computer would not be vulnerable to this. I doubt, I can apt install WSH. And even if I could, I would not. :-)

  • @TobiasTimpe
    @TobiasTimpe 3 года назад

    JScript is one of my favorite languages.

  • @guky667
    @guky667 3 года назад

    THIS IS SO FRICKIN COOL, WTF!!!

  • @stefank2387
    @stefank2387 3 года назад

    Finally, great content

  • @eklypzn
    @eklypzn 3 года назад +5

    Hilarious. I'm wearing that shirt right now.

  • @AnthonyBlakley
    @AnthonyBlakley 3 года назад

    This was quite the episode..

  • @gustinstamatinos9910
    @gustinstamatinos9910 3 года назад

    I could sit back with a beer and watch these all month. ...okay, a few beers.

  • @camerontgore
    @camerontgore 3 года назад +1

    I get a good chuckle everytime you say Show-toast 😂

  • @jimo8486
    @jimo8486 3 года назад

    What I use to look up an IP I use check-host and it will tell u all about the hosting

  • @logiciananimal
    @logiciananimal 3 года назад +2

    "Please commit Sudoku"? Not while I'm supposedly at work! This video is at least job related sort of otherwise.

  • @ikhmalfahmi9308
    @ikhmalfahmi9308 3 года назад +3

    Reallyy missing your ctf videos :,((((((((

  • @crystal_royal3405
    @crystal_royal3405 3 года назад

    Epic

  • @drasticwarrior5357
    @drasticwarrior5357 Год назад

    @John Hammond, Do you ever go live?? and if so may i please ask what your preferred platform is

  • @theragequitgamer246
    @theragequitgamer246 3 года назад +4

    I'm afraid to scan the qr code on that shirt lol

  • @bosch5303
    @bosch5303 3 года назад +1

    Fun fact. Factura in romanian means invoice

  • @ViperDerKranke
    @ViperDerKranke Месяц назад

    12:20 says it all

  • @userou-ig1ze
    @userou-ig1ze 3 года назад

    didn't catch how it deploys, do you have to run the file?

  • @thewhat4228
    @thewhat4228 3 года назад

    Please where can I get the code or download link to this

  • @DD-hn2jr
    @DD-hn2jr 3 года назад +1

    First I saw somebody using pkill in real life

  • @cyrussecurity
    @cyrussecurity 3 года назад

    Toast to "show-toast" :D

  • @huongkieu8335
    @huongkieu8335 3 года назад

    John can you give me the link of first file in this video?

  • @jkobain
    @jkobain 3 года назад

    I've never used NodeJS to casually run JS manually, rhino is a thing, IMO.

  • @PreetisKitchenltr
    @PreetisKitchenltr 3 года назад +4

    Yay!!! I am first like as well as comment! Great Content Sir!

  • @dowLoveTap
    @dowLoveTap 3 года назад

    just found this channel, i'm sevral hours in.. oof

  • @nextlevelbruh827
    @nextlevelbruh827 2 года назад

    though, vim is incredible 😉

  • @SuiGio
    @SuiGio 3 года назад

    Hey man, I have a obfuscated js code which creates a chrome extension for a game. I was wondering if you would like to share that with you, see if there's a malware in it? Would really like to see whats beneath it, since I've been using it many years now. Let me know how to reach out to you. Cheers, great content!

    • @_JohnHammond
      @_JohnHammond  3 года назад

      Yes please, always happy to take a look through some weird code -- you can email me with the address in the description :)

  • @Dooglet
    @Dooglet 2 года назад

    maybe I missed it but how does this usually detonate?

  • @razaullahkhan8099
    @razaullahkhan8099 Год назад

    NICE ANDROID RUNNING NOW THANKS

  • @0xhex
    @0xhex 3 года назад

    Could you please share code source ?

  • @marlonius05
    @marlonius05 Год назад

    interesting.. still learning... h1senzz3... Hisense? So Huawei/Honor???

  • @thowbikdustan6515
    @thowbikdustan6515 3 года назад +1

    Hey john, can you just upload the malware file anywhere and provide link. AHH maybe your github is fine !!

  • @andrewloucks6568
    @andrewloucks6568 3 года назад

    Anyone ever wonder why the bears need so much toilet paper in the charmin advertisements that keep playing ??

  • @MartinHaunschmid
    @MartinHaunschmid 3 года назад +1

    Now I REALLY want to know what 'show-toast' is.
    EDIT: Now I do. Don't know what I expected.

  • @crazylegs85
    @crazylegs85 3 года назад

    vim...vim...vim! VIM!!!

  • @claudiafischering901
    @claudiafischering901 3 года назад

    I found a wired server with a bunch of applications from a doc vba file. But I think this server should be offline now. I think I delete the file because the file which has been downloaded was not on the server. All I know is that target was windows - but it was sended up to a MAC User - that is a little bit stupid I guess. Thanks for video - I have a lot of fun.

  • @grandmakisses9973
    @grandmakisses9973 3 года назад +1

    “Please send me malware” lol should been my graduation quote

  • @jkobain
    @jkobain 3 года назад

    «Lua» stands for «moon», while the UAC actually mined Mars…

  • @whatthefunction9140
    @whatthefunction9140 3 года назад

    How would the js ever reach out of the browser?

    • @carterplasek498
      @carterplasek498 2 года назад +1

      He references this in a few other videos, this isn't Javascript, it is JScript, which is a confusing way of saying it is Microsoft's Javascript, a scripting language using the same (or very similar) syntax to javascript, but does windows stuff and can run on windows.

  • @magicball60
    @magicball60 3 года назад

    Share code :) hehe would love to take a look at the rdp module

  • @corbezzz
    @corbezzz 3 года назад +1

    RUclips algorithm things

  • @tsustyle6263
    @tsustyle6263 3 года назад +1

    SHOW TOAST!

  • @fra1897
    @fra1897 3 года назад

    love the bash at vim fanboys

  • @btno222
    @btno222 3 года назад

    Is it good nsa

  • @dddddddddavis
    @dddddddddavis 3 года назад

    I always watch your reviews and always wonder: what is usually your next step after the analysis? do you follow up reporting the c2 server? if you eventually find out an unreported malware will you follow up with a report? just wondering because these actions can help users in the end of the day.
    - also, thanks for putting out always some good content

  • @cat-boy1357
    @cat-boy1357 3 года назад

    38:08 - "OwO what is this?"

  • @CarRamrod-uf2ub
    @CarRamrod-uf2ub 3 года назад +2

    That 1 dislike must have been a mistake.

    • @baxsm
      @baxsm 3 года назад

      that was from the hacker :/

  • @realMattGavin
    @realMattGavin 2 года назад

    I think John was the one who stole the $600mil of ETH and was trying to bring us valuable ententertaining content. Also the way that John acts reminds me of the somewhat "innocence" of the ETH hacker... like "uh, oh, what did I do?" Then returns it all back.

  • @real1cytv
    @real1cytv 3 года назад +1

    Well, I'm not shouting at my monitor, but with the stuff you do, I think VScode(/VSCodium) would be the better fit...

  • @isosthenie8271
    @isosthenie8271 2 года назад

    Python is a good language. Bite me. :D

  • @bellshoe2894
    @bellshoe2894 3 года назад

    I love watching Justin Roiland hack the NSA

  • @daryll4645
    @daryll4645 2 года назад

    lol Commit Sudoku

  • @hackingismylife2167
    @hackingismylife2167 3 года назад +1

    Please I need your help

  • @magnum_dingus
    @magnum_dingus 3 года назад +5

    John, keep using python.

  • @Vlad.1610
    @Vlad.1610 3 года назад

    What about the Dark Web videos?

  • @LycanEnforcer
    @LycanEnforcer 3 года назад

    Yeah, regex with that many characters is fun isn't it? Usually better to just open up python and write a script to replace characters in a document.

  • @gorway6807
    @gorway6807 2 года назад

    Why is he so scared to say “slaves” when it’s a pretty common computer term with a specific meaning? Cool content tho

    • @heraclitus7893
      @heraclitus7893 Год назад

      RUclips algorithm demonetisation I suppose

  • @techysecurity4107
    @techysecurity4107 3 года назад

    Javascript = 😌😌

  • @MarcinGrobelkiewicz
    @MarcinGrobelkiewicz 3 года назад

    Can u help to how to do referendum ?how to do real voting ? How to stop fake plandemy

  • @pinkeye00
    @pinkeye00 3 года назад

    cntrl+z

  • @RyzekZ0008
    @RyzekZ0008 3 года назад

    1:02:10

  • @JNET_Reloaded
    @JNET_Reloaded 3 года назад

    mics way too close sounds like your shouting!

  • @Tedd755
    @Tedd755 3 года назад +2

    More analysis/reverse engineering, less googling please. Do it off-camera, and if there's any insights, give a summary. I don't like watching someone else browse. I can do that myself.

    • @viv_2489
      @viv_2489 3 года назад

      @@miyu1424 yeah agree, he is working through and displaying it to us at the same time... I think his concern is that more deep code analysis should be done for C# exe's or binaries in video but that would take immense lot of time...

    • @issecret1
      @issecret1 2 года назад

      No, thanks. Then if I don't know something he uses I get intimidated and have no idea how he found it