Analyzing the Zeus Banking Trojan - Malware Analysis Project 101

preview_player
Показать описание
⛔ Disclaimers: I take no responsibility or accountability for infection of malicious software, programs, files onto any computer or workstation. This project and videos are for educational purposes only. I do not condone the development, use of, or spreading of programs to intentionally harm assets, networks, or individuals.

Safety is key when dealing with malware. Ensure you always are following protocols when it comes to downloading and detonating a malicious sample. Follow all instructions within the courses and listed resources.

📝 Notes:

⏰ Timestamps:
0:00 - Introduction
1:01 - Overview of Analysis
3:52 - Background Info & History
7:11 - Overview of Analysis Tools
14:05 - Download Zeus Banking Trojan
19:25 - Static Analysis
55:27 - Advanced Static Analysis
1:06:36 - Dynamic Analysis
1:29:33 - Writing YARA Rule
1:40:55 - Conclusion

🔗 Links & Commands:

🐕 Follow Me:

🤔 Have questions, concerns, comments?:

🎧 Gear:
Рекомендации по теме
Комментарии
Автор

ive sat through a lot of cyber threat related presentations and this was great! very informative and you have a really good presenter voice.

ruzu.
Автор

Very cool and in depth analysis. Haven’t finished the video but already just loving finding all these tools for malware detection and analysis

BreakingStupidity
Автор

this is really incredible grant, hope there are future eps in the work!

gitgudsec
Автор

This is the best Trojan. I am glad that I was familiar with the author of this magnificent virus and was in his group back in 2011.

vitss
Автор

I really enjoy your channel keep them coming. what I was needing. Thank you

bishophunter
Автор

Thanks for breaking everything down! Great for beginners and pros alike

mattheworr
Автор

As soon as i finished watching the build for a lab, talk about perfect timing :)

MrIntake
Автор

Brilliant. I hope you create more content like this one !!!

Thank you for sharing

Manavetri
Автор

20:35, Another way to keep your anxiety in check is to remove the .exe file extension meaning if you accidentally double-clicked on the file it won't recognize it as an executable and it won't execute, and change the file extension anxiety free just use the command line or PowerShell to change the files .exe extension to the file name with no extension.

ME-LU
Автор

intro is the uac bypass method, loops until you press yes

robrox
Автор

Mind blowing. keep bringing these kind of wholesome videos. It really inspired to me get started being a newbie.. 😍 Few question though

1. I wonder why didn't you mention defanging the binary before performing all the static analysis.
2. Will there be more in depth analysis of malware in future videos? Like dissecting source code, if it can be recovered in some way. So that we can understand how it actually deleted itself and placed itself inside google update .

AvinashKumar-fexb
Автор

first off, great video. Exciting to work with something live and be guided as we go. There are a few things that I would hope you may touch up on with your next video. Someone commented about defanging. That sounds important. As for me, I would like to know what to do with the malware files after one is done. Does one simply turn off the VM or does one send the files to the trash bin, recycle, and then shut down the FlareVM window, or can we just simply reset the Snapshot? I know it sounds silly to ask, but definitely would help. Keep up the great work and again, looking forward to more of your videos.

lexiriam
Автор

Hey man, I don’t comment much on Youtube videos but you helped me with my capstone project for school. Thank you for your content!

kishanpatel-uksu
Автор

This is really well done
However my malware was not acting at all the same way as yours was, it didn't ask to run any app and it had maybe one or two processes in the process tree. When detonating on WireShark, multiple times, never got a peep out of it. Made sure I was running remnux and all that, and they were connected host to host, etc

But, I was still able to run the process alongside you, which is what I was looking to do. Great experience to put on a resume.

ChadVanHalen
Автор

I am stuck at the part where you enable the internet in the FlareVM i copy everything you do but im getting not able to reach any web pages i imagine because my dns settings on FlareVM is 10.0.0.4 which is the REMnux ip. How did you get it working? thx

willroberts
Автор

Amazing Video! I learned a lot. Keep up the good work!

dekra
Автор

Im getting an invalid architecture error when trying to floss the executable into strings.txt

ftgljared
Автор

Very COOL video, are you going to do it with AWS version too? It would be amazing to see how it's done in a cloud enviroment

MarcBadalBatllori
Автор

It would be helpful if you send the analysis report link to download. I am in need of it. Thanks

dharsann
Автор

I would like to see how malware obfuscate themselves to evade defender and all

firosiam