Where Does Malware Go On Your Computer?

Поделиться
HTML-код
  • Опубликовано: 15 ноя 2024

Комментарии • 86

  • @_JohnHammond
    @_JohnHammond  Месяц назад +54

    (This video was recorded months ago but didn't end up being uploaded.)

    • @RandomytchannelGD
      @RandomytchannelGD Месяц назад +7

      8 hours ago

    • @LDowning0190
      @LDowning0190 Месяц назад +3

      We forgive you John!

    • @Hnxzxvr
      @Hnxzxvr Месяц назад +4

      Even better old new videos makes me feels cool

    • @apoorvpatil1346
      @apoorvpatil1346 Месяц назад

      Thanks for this!

    • @SyBlast
      @SyBlast Месяц назад

      Slackin! 😂 jk thnx for the upload & the honesty lol

  • @kyroware
    @kyroware Месяц назад +32

    As a person who's been developing and analyzing malware for a couple of years now. On the more sophisticated side of malware it will be more evasive and hide itself better then the typical python grabber you see from github. Some don't even drop files, It just pads 0x90 (-x86-64 nopcode) and executes payloads that connect u to a backdoor etc... But most commonly, yes you will find the common malware hiding in these directory's.

    • @ThisIsJustADrillBit
      @ThisIsJustADrillBit Месяц назад +8

      How does fileless malware persist? Or can it? If it's not on disk can it survive reboot? Actually asking I do not know and I'm curious.

    • @EinfachNils02
      @EinfachNils02 Месяц назад +3

      ​@@ThisIsJustADrillBitCompletly fileless idk. But Most "fileless" maleware is hiding in the registry. Extremly difficult to find

    • @kyroware
      @kyroware Месяц назад

      ​@@ThisIsJustADrillBit Okay I'm going to answer this in a couple of parts. Malware does not always need to drop another file (example: you run "Main-Malware.exe" and it drops "Dropped-malware.exe"), You can simply make something that when ran it will execute payloads gathering system information or what ever you desire. If you were to restart your pc, the payloads are already executed and sent everything to a c2 server or how ever you developed it. You could also just develop the file to run on startup if that's what you're asking. It could also hide in the reg-keys, bios etc.. Plenty of different ways malware could hide its self, The video john made just goes for the more common types of malware. Hope this made sense.
      (sorry for the late response, this hurricane fucked my power xd)

    • @CU.SpaceCowboy
      @CU.SpaceCowboy Месяц назад

      using python as malware for non linux os is dumb lol

    • @Wladik0
      @Wladik0 Месяц назад

      In these directory's what?

  • @tigerownz
    @tigerownz Месяц назад +3

    Great Content John!
    It's awesome that you released a "pay what you can" course, some people - especially where the currency isn't strong - struggle to deal with the US$/€ "standard" price labels.
    Cheers!

  • @JohnSmith-jc7dk
    @JohnSmith-jc7dk Месяц назад +4

    I saw a john hammond ad before this video.

  • @AhmadAli-l8t6f
    @AhmadAli-l8t6f Месяц назад +2

    Hi John, love your channel. I have a request, could you please do a similar video for Mac OS? Also I would request please do more videos targeting Mac OS

  • @AlexTsaava
    @AlexTsaava Месяц назад +1

    Great new video john, Really like your video :) but im confused this is 8 hours ago and only 8k view i think you deserve more for this content.

  • @seiv-
    @seiv- Месяц назад +1

    Hey John, the reason that your rule is not triggering is because your image doesn’t really contain \Users\*\. Instead you should consider making it more generic by adding just the \AppData\Local\Temp part, which is indeed part of the image and this will make it trigger for every user’s temp directory:)

  • @infinitivez
    @infinitivez Месяц назад +7

    The reason appdata isn't often considered, is because a lot of valid applications (like chome) will install there if the user chooses to install for "this user only".
    I think the rule you tried to wildcard might likely need to use their form of string matching ie: [^\\"]{1,20} (you can see an example of this in the dash @7:05)

  • @Smallz2000i
    @Smallz2000i Месяц назад +1

    %temp% or %appdata% some go to the register as well

  • @rodneytrotter5656
    @rodneytrotter5656 Месяц назад +1

    Just to say that the Windows context menu is absolutely appalling. Why on earth they need you to click "More Options" just to rename is beyond me. The old menu was fine and worked well.
    P.S. I know you can amend things to back to this, but it shouldn't have been changed in any case

  • @logiciananimal
    @logiciananimal Месяц назад +1

    I wonder if some of those directories are excluded from the rules because there would be too many false positives.

  • @5DimesPlayer
    @5DimesPlayer Месяц назад

    This looks like a test. John knows the answer, but is waiting for someone to respond why it didn't work.

  • @NotElliot21
    @NotElliot21 Месяц назад +2

    Please tell me what your keyboard model is!! Looks sick!

  • @fdert
    @fdert Месяц назад +1

    perhaps you need a trailing \ at the end of that string?

  • @rob2rox
    @rob2rox Месяц назад

    john if you post more low level stuff (i.e. shellcode execution) i think it would be interesting

  • @T3RRY_T3RR0R
    @T3RRY_T3RR0R Месяц назад +1

    I'm wondering if the directory rule requires a trailing backslash, given all other rules had one

  • @xTerminatorAndy
    @xTerminatorAndy Месяц назад +1

    You didn't end the dirs with slashes whereas all the other rules ended them with [back] shlashes?

  • @YousefNein
    @YousefNein Месяц назад +1

    Hey John, love your videos. I don't think this one was very informative, I believe it's better to check where does malwares drop their files if you know what I mean.

  • @mbithi_ke
    @mbithi_ke Месяц назад +8

    a threat actor here, just finished developing a malware and was wondering where it can go, thanks for the video John (:

    • @fatedsky6700
      @fatedsky6700 Месяц назад +4

      Blud is not a malware developer if he doesn’t know where to store it (also file less is so much better)

    • @ptrouma
      @ptrouma Месяц назад +1

      Haha ati wewe ni threat actor? 😂😂

  • @jpopperman9369
    @jpopperman9369 Месяц назад +2

    In place of the username you should have %user%. So \Users\%user%\AppData\Local\Temp would use the current users temp file

    • @CU.SpaceCowboy
      @CU.SpaceCowboy Месяц назад

      obviously lol thats generally how every program ever that uses temp folder works

  • @gat2871
    @gat2871 Месяц назад

    1:29 explorer.exe shouldn't run out of System32, but from C:\Windows 😅, little correction. (love your videos John!)

  • @Ny_babs
    @Ny_babs Месяц назад +3

    Can you not just add into the sus.yaml file the entry - '%TEMP%' ?

    • @CU.SpaceCowboy
      @CU.SpaceCowboy Месяц назад

      temp folder gets cleared occasionally or the file could be overwritten if its not unique enough so its not ideal

  • @brandonbiochucky3116
    @brandonbiochucky3116 Месяц назад

    i was wondering what is the best antivirus to use

  • @RichardLofty
    @RichardLofty Месяц назад +4

    6:28 he finally figured out that maybe it's just the name.
    Funny now OWROWRA doesn't even check file name history... And just gives up.
    Also not even having a hash of the raw exe of a known virus in a database? Not checking for it? This whole video feels like it's made for toddlers...

    • @outhouse.wholesaler
      @outhouse.wholesaler Месяц назад +1

      Wonder if he renamed calculator to memekatz if that would trigger

  • @JNET_Reloaded
    @JNET_Reloaded Месяц назад

    maybe the program that detects it runs from that location and fires of a notification so they removed it doubt it tho they could surely whitelist themselves!

  • @Carlos.750
    @Carlos.750 Месяц назад

    my OCD is screaming at the repetitive use of *.exe ... so much string duplication

  • @Vietnam35162
    @Vietnam35162 Месяц назад

    Why is this an ad?

  • @duncan3144
    @duncan3144 22 дня назад

    ADS and a long key in the registry.

  • @hehefer
    @hehefer Месяц назад

    @_JohnHammond, thank for ur dose of skill eveyday i hear u i sleep less fool
    btw can a file malware be customised to be inputted where it task it

  • @kaushikparmar6066
    @kaushikparmar6066 Месяц назад

    John what about your osee cert

  • @g.paudra8942
    @g.paudra8942 Месяц назад +19

    Who tf running a program from recycle bin?

    • @AlexTsaava
      @AlexTsaava Месяц назад

      that impossible

    • @seiv-
      @seiv- Месяц назад +1

      @@AlexTsaava nothing is impossible with computers:)

    • @Alfred-Neuman
      @Alfred-Neuman Месяц назад +2

      @@AlexTsaava
      How is that impossible?
      The easiest way I can think of is probably to code a loader that would get the data of this executable directly from the file system, load it to memory and execute it. It's probably also possible to do something similar with a PowerShell command or maybe even the good old command prompt...

    • @AlexTsaava
      @AlexTsaava Месяц назад

      ohhh never though of that

  • @micheal_fontes
    @micheal_fontes Месяц назад

    How do you get the virtual machines to run so smooth?

  • @nategetnuet
    @nategetnuet Месяц назад

    thanks baby john hammond

  • @henryade5134
    @henryade5134 Месяц назад

    Registration button not working

  • @Shadow-Algeria
    @Shadow-Algeria Месяц назад

    Your videos are always great. ❤

  • @RichardLofty
    @RichardLofty Месяц назад +4

    Using YML files for an antivirus!?!?!?
    How about a virus just go ahead and change the rules inside lol.
    Not having your own closed binary format is BIG mistake.
    That way any virus can just change the rules inside yaml and not have the files deleted.
    In a closed format, that is not reverse engineered, the only option a virus has, is to delete the files that have the antivirus settings.
    This is just an additional attack vector, that you get just because you decided to use YML, an open format lol....

    • @pedrobarthacking
      @pedrobarthacking Месяц назад +1

      "Regarding the use of YAML files in Aurora-Agent EDR, the concern raised about vulnerabilities tied to open formats like YAML is valid to an extent. However, the Aurora-Agent team provides mechanisms to mitigate such risks. Although YAML files can be more accessible for manual rule configuration, there are measures like rule encryption available to safeguard these files. Aurora offers an option to encrypt its signatures, reducing the risk of tampering with configuration files. Additionally, when managed through the ASGARD Management Center, there are further security controls in place that centralize and secure the management of rules, reducing the likelihood of unauthorized modifications."
      Moreover, the team has acknowledged potential gaps in self-defense mechanisms in the past, but they continue to work on improvements, as mentioned in their documentation and training resources​

  • @georgehammond867
    @georgehammond867 Месяц назад

    on Linux ?
    Do you anything about your pc in Docker container, somebody else control it, and hack you all day long?
    This is Government type of work, and local internet providers.

  • @ashukumar5815
    @ashukumar5815 Месяц назад

    You Love For India ❤

  • @iamwitchergeraltofrivia9670
    @iamwitchergeraltofrivia9670 Месяц назад

    Windows is so trash on websites with certification windows defender is not blocking Downloads from the websites 😊😊😊

  • @mikee.
    @mikee. Месяц назад +2

    "sigma based edr" 🗿

  • @BrAiNeeBug
    @BrAiNeeBug Месяц назад +2

    My Malware brings his own SMB Server and defeats moslty all AV.

    • @RootsterAnon
      @RootsterAnon Месяц назад +1

      My malware beings all the boys to the yard, damn right, it's better than yours... I can teach you, but I'll have to charge...

  • @RichardLofty
    @RichardLofty Месяц назад +1

    It's called a "DASH" ... "tac tac dashboard".
    You have to be kidding.

  • @likhithkadambala3119
    @likhithkadambala3119 Месяц назад

    Great video

    • @tub1n
      @tub1n Месяц назад

      bro watched the video in one minute

    • @likhithkadambala3119
      @likhithkadambala3119 Месяц назад

      I'm used to this kind of stuff,,,,so skipped to watch the over side explanation😊

  • @margarita8442
    @margarita8442 Месяц назад

    malware goes in your voice darlinks,, its so annoying

  • @RandomytchannelGD
    @RandomytchannelGD Месяц назад

    Hello!

  • @Marty757
    @Marty757 Месяц назад

    :JohnKekw:

  • @ririxyarmageddon
    @ririxyarmageddon Месяц назад

    Hammond you sodding tictac

  • @Tinera420
    @Tinera420 Месяц назад

    Damn, Im so lost in this 😂😂
    Dont even know where to begin learning this type of studf

  • @carsonjamesiv2512
    @carsonjamesiv2512 Месяц назад

    😃👍

  • @RespectHand7
    @RespectHand7 Месяц назад +1

    I start reading if john like my comment
    I do my all homework if he reply on my comment 😊😊😊😊😊

  • @AwaisMalik-w6n
    @AwaisMalik-w6n Месяц назад

    😮p9o kll

  • @gooniesfan7911
    @gooniesfan7911 Месяц назад

    Bro WHAT is this video 😂😂😂😂😂

  • @cybersec1337
    @cybersec1337 Месяц назад

    Windows is crappy 😂 .. im sorry, the only use for windows is to reverse malmware 🤣🤣🤣🤣 but for US, windows will keep the cybersecurity market growing.. thank you MS ❤ .. Mac and Linux owns me all … 😅

    • @Felfu_
      @Felfu_ Месяц назад

      Linux and Mac are just as vulnerable to malware as Windows

  • @RkKhan-mc2vt
    @RkKhan-mc2vt Месяц назад

    Brother please in hindi language me videos