Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis
HTML-код
- Опубликовано: 17 фев 2021
- If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer smart completions and documentation. www.kite.com/get-kite/?... (disclaimer, affiliate link)
For more content, subscribe on Twitch! / johnhammond010
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
PayPal: paypal.me/johnhammond010
E-mail: johnhammond010@gmail.com
Discord: johnhammond.org/discord
Twitter: / _johnhammond
GitHub: github.com/JohnHammond
"This is just 75 lines of code"
*Half hour later*
"201 thousand characters selected"
that's how they get you man, that's how they get you.
@@AlucardNoir AND YOU BUT GUESS WHO NOT?! ME AND JOHN
Majorly loaded by a fake jpg ;)
@@geist453 l
@@bansku570 I
Love this malware analysis series!
Me too! Amazing series
I love it too!
me too, this guy is really good.
Sir. Can I use remcos rat to hack Android...
Ngl, never thought it would be so much fun watching someone analyse and breakdown a virus.
I was thinking the same thing! I might have just discovered my new rabbit hole lol
Woow
Times must be hard, Ed Sheeran is writing python.
Lmaooo💀💀
he looks like an unscuffed burgerplanet
This is ed sheerhan and Seth rogans kid.
You are the hacker version of pewdiepie. Very entertaining to watch.
Nah he looks like a de deobfuscated Ed Sheeran
I love how they went through six stages of obsfuscation, and a lot of effort into hiding what they were doing.... but their payload was literally called "Attack.jpg" like surely they could have named it something at least slightly less blatant.
Perhaps they didn't care to hide it at that point? I know that obfuscation helps to counter analysts, but when the code is downloading data from a URL, then I suppose it wouldn't've been worth their effort to obscure the name of the download. Then again, they could've made a second download with totally unnecessary data. Either way - this thing is bad (for you)! xD
The REMCOS developer "discourages malicious use". For sure, everyone will use solely for legitimate purposes.
'sure if you say so' meanwhile no one uses it legitimately
Malicious actors: amma head out
Ethical hackers don't sell hacking toolkits, ethics and all that... 🤷♂️
@@garethevans9789 Pentesting tools are released open source because not only is open source more effective, but it makes sure that the developers are not potentially profiting off of malicious actors, intentionally or not.
Meh, skids are gonna find a way anyway. With our without this program.
Damn that was fun to watch!! Thanks and keep them coming!!!!!!
I love when John is laughing over the Attack.jpg url
best part
Great video, I love this series. Also special thanks for zooming in this much, watching code-related stuff on phone is usually a pain, but not in your case. Keep up the good work!
I'm just finding this channel and its quickly becoming my favorite content. Im fascinated with all of this. Really inspires me to get started with basic coding to get my feet wet.
This style of video really helps me with my start in forensics and malware analysis. I love liveoverflow and other CTF summary channels but they often feel like magic in the way they present their findings. Keep up the great work :3
Where have you been all my CS degree? This is awesome watching this stuff in action as you do it. I love the content! Definitely going to keep watching!
So far this is the most fun I've had watching hacking videos. Your analysis is fantastic and I enjoy seeing your process. Keep it up!
Whatever that quality is that great teachers have, you have it. Never change the format of your videos. I love seeing you troubleshoot and reason through everything live.
Dude you are simply awesome...it's so enriching for all of your viewers to see your hard work and all your skills, and the best of all is that we can see you enjoying so we enjoy and learn too. Regards from Spain!
I love John’s response when the light bulb goes off and all the hard work comes together. Great video as always.
After watching this, gained a keen interest in Malware Analysis. Thanks for the awesome content.
Content like this is why I don't have to pay for cable, satellite, or netflix!
But then he would have been on 8-12 screens and typed those 200k characters (hacking is typing fast), it's all hard to follow. It would be like watching the Matrix.
Yeah
Okay, but consider this: TOS and TNG are on Netflix.
What a great catch! This is by far the most interesting video I've watched on RUclips for a very long time. I love this of unedited video.
you got my sub for this. its 3am in the morning and I've watched the entire thing having so much fun. keep on with the good stuff
Loving this series. Would like to see some disassembling malware analysis.
Pretty sure you need to run the obfuscated version of the AMSI bypass.
Great video, would love to see more of these!
Scheduling this to start at the same time as the new mars rover is landing... Bold move cotton, let's see how it works out
Bah, totally didn't even realize xD Ah well!
@@_JohnHammond I’d prefer watching this over some rover landing
@@tripplefives1402 isn’t the rover automatically controlled because the delay would be 10 minutes long?
Totally enjoyed the video. It was an absolute rollercoaster ride. I love the way you present and explain the details in all your videos. And also none of your videos ever seem to be monotonous even when we are dealing with such mind boggling stuff because of the way you laugh and get excited when you crack/deobfuscate a piece of code. 😁 Thank you so much for taking the effort and sharing the awesome work😊
i missed the premiere, but this is definitely a blast to watch. Would love to see this more
Hands down one of the best malware analysis walkthroughs I’ve seen. Watched it twice.
You make easy to understand videos as you break things down. i really enjoy them.
I have a vague understanding of coding and the way you work is easy to follow.
I love these malware analysis videos. You break stuff down to a fairly easy to understand level for most technical people.
I'm just getting into cyber security and I'm really enjoying your content, thank you.
I was watching some scam baiting videos and also doing some deep dives into RATs and just... CyberSec/CompSci things in general and found this video. I'm glad I bumped into your channel. Really good stuff you have going on here
the evolving of rat is so amazing, i remember in late 90's where sub7, netbus and back orifice was so popular and inspired me into hacking. IRC was the channel to go to before and dial up is your connection.
I've taken apart stuff like this (when I worked in large enterprise) but the samples were rarely more than 3-4 levels deep. This actually looks a lot more like a challenge you'd get at a CTF competition _(perhaps they're getting ideas from each other)_ ?
John - This is great content. I really am learning a lot watching you work these out. Keep it up! The masses demand more of this!
John, as you are very good, you should stand this comment: In Powershell a "split (..)" is a regular expression splitten in string in portione of two characters, ie "4142" becomes "41", "42", in Hex AB
That was freaking wild, man. You're sharp at this stuff
Damn, I just watched over an hour of stuff I have no clue of and I still feel educated and entertained.
It even kinda makes sense, when you talk about it and explain some stuff.
Thank you very much! :)
This was actually fun to watch and go on this journey with you! Loving these videos
This is one of the best educational videos i've seen
Amazing work, you deserve the money from the RUclips overlords. Literally only commented to help boost those algos.
Wow, that was awesome video. It is so nice to see you go through all the steps and thinking while deobfuscing. This RAT is kind of really scary for everything it can do. I would like to see more of this in the future! Keep up the good work
Absolutely brilliant! I've discovered your channel yesterday and I can't stop watching. This stuff makes me want to give it a shot as well. Never knew that deconstructing programs/scripts (especially ones with malicious intent) could be this much fun! Subbed+bell.
Well worth the watch. This is a great video. Please do more. :)
how do you copy and paste into VirtualBox in Windows 10
The guy that wrote the script watching this video rn must be like 👁️👄👁️
That was a great video. I don't know a whole lot about what you do, but it was super fun watching you do it. Thanks so much!
I binge your videos every day all day at work. Gets me through the day and I learn some new/cool stuff.
"is this the newest version? because that would be pretty slick"
*immediately scrolls past the version number 3.1.0 showing it is the latest version*
Nobody:
Virus Code: * Does malicious stuff*
John: Is it trying to do something bad? HAHAHA
Us: Duhhh John. wtf
Awesome awesome video John! I have followed these de-obfuscation things and when I get to the PE32 I usually say f-it and give up and upload it to virustotal. I'm so glad you went further with this. Thanks so much man!
Keep on doing those Malware Analysis. It's really fun to watch and it's quite educative too!
In the next episode... John rewrites the kernel for more efficient find and replace..... STONKS!
Plottwist: this is all just an advertisement for BreakingSecurity
Awesome work buddy !!! watching your videos while at work coding my self ... thanks for the vids
You know so much about so many things... I've learned so many things in the few videos I've watched so far. Super, super inspiring.
"Can I get anything out of Melons?"
You can get juice, John. Juice.
that url has to be the greatest thing ive ever seen
Really interesting video, thanks !! I'm impressed at the obfuscation job done on this malware it's impressive
This is crazy. I've learned more about malwares in a few vids I saw from you, than the time I spent trying to get into the field years ago. I'm a fulltime dev now and have been working for over 7 years. Reminds me of my recent grad days where all I wanted was to understand this. Much easier to follow now, and damn, learning so much so quick now. Props to you.
Algorithm, give this man the recs.
It worked. That's why I'm here.
"guys, you might think i'm dumb" LOL exact opposite.
This was so fun to watch. The sketchy url was very funny, fitting pun on with the ‘holy cow’
I'm learning to program in college rn and I just ran across your channel and my God man the length people go to, to scoot around anti-virus software and download shit on your computer is insane.
Although seeing how all these functions are working together is awesome!
Keep up the good work!!!👍
this is gonna be good
Indeed Indeed :D
Attack.jpg, that was hilarious
Brilliant. You make malware reversing so fun to watch.
John Amazing teaching methods so clear and precise i was able to follow you all the way to the end. Your amazing man, I was looking fr the next new thing to get into its malware analysis. please show me more i might be a natural at this
That's a rabbit hole if I've ever seen one haha great stuff man!
If only it (the rabbit holes) were rare. 😥
Follow the white rabbit!
every single line "I don't exactly know what is going on here" so basically this guy is just us trying to understand code. got it.
Man I love these videos. As a junior network tech I love watching this, so interesting and entertaining!
Watched the whole thing from start to finish - loved it! Make more!
I have basically no connection to it-sec, but this stuff is addictive ... love the videos
Please mahn ... we need more malware analysis like this!! ... and also ... C source code analysis (something like that)
Your knowledge is very impressive! Love learning from guys like you!
I love your videos which are not preplanned... It gives us an option for us to know how you actually resolves when you are stuck....
The Title is like
Asking if water is wet LOL
THOSE DOWNVOTES....GTFO...this dude is a legend
Just watched this now, been on my watch list for a while. Great Video.
complete amazing by the skills you have for it. many questions i can think a bout it. good work man love it
John: releases a video with malware analysis
Me after watching a video: *Lemme check real quick whether notepad.exe is running in the background or not in Task Manager*
Imagine using windows 🤔
@@benricok Imagine thinking that exploit-db had 0 results for Linux 🤔
@@Reelix I didn't even mention an OS? I am aware that Linux isn't perfect as so with every software product (opensource or not). The worst thing you can do to your security is to be over confident in your defense.
@@benricok Imagine being a pompous asshole. Some people want to, you know, play normal games on their computer.
@@theluckyscav3487 I mean linux gaming has come a long way, but it still needs some time to flourish
Amazing stuff. Learned a lot from this video.
I have a question: how did you come across this script? Did someone give it to you? Anything like that?
Loving these malware analysis videos, John. Keep 'em coming!
Totally epic stuff!. I am not even into coding and or info sec. Just stumbled upon this video and couldn't stop watching!
Wow, that was a crazy ride! Thanks for taking us on the journey.
I have no idea what I'm watching but I'm enjoying it :)
It's actually not a bad way to learn, at least starting out - if you're interested. I have a background in software engineering, but I only understand maybe 75% of what's going on.
"I don't like these advertisements..." "You didn't see this here folks!" "Not in a John Hammond video!"
Hi John, Love these kinds of videos! Keep making them! Great discovery! And current! Hahaha, that was unexpected. Looking forward to some more content.
Man i'm brazillian, and i love all of this videos, but this... mannn to amazing !! Continue delivery this content to us, i apreciate this
59:31 No. That's the noun "licence" as opposed to the verb "license". It's a British thing.
Waiting for it :)
I knew exactly what it was a few minutes of you scrolling few the strings!!! I feel proud! And thank you for making this video, I learned a lot.
You need I high level of nerdiness to find this entertaining. Proof: I find highly entertaining!
Love this.
Remcos: "We specialize in ethical hacking"
Also Remcos: *is used in malicious code*
That was more than a safari ride! It's awsm
That was epic dude!
Felt like a real rollercoaster. I can't believe you got to them within 24 hours of release.
So nuts.
Pls keep up the malware analysis videos! Its so fun to watch!
was great :)
Where do you get such fresh samples? That hash isn't even on VT yet.
Plot twist: John actually wrote it
Love your videos dude. I personally have learned so much form watching them. VERY COOL find btw..
Fantastically enjoyable to watch you solve problems as always . Thanks John
Legend
so where did you get the jscript if it was only released so recently...
i wanna know too
The actual payload was hosted remotely, so that can be updated separately.
WOW man, you're so smart. I really enjoy watching your videos. Please keep it going. I have no idea what you are doing, but somehow it is logic and it make sense :D
These videos have been awesome. Please keep up the awesome malware analysis