filmov
tv
Lazy String Decryption Tips With IDA PRO and Shade Ransomware Unpacked!
Показать описание
We use x64dbg debugger to unpack troldesh / shade ransomware then we use IDA PRO to quickly decrypt strings and resolve dynamic imports. Expand for details...
-----
OALABS DISCORD
OALABS PATREON
OALABS TIP JAR
OALABS GITHUB
UNPACME - AUTOMATED MALWARE UNPACKING
-----
Original packed sample:
b1f13a9ef3da3c9bd2cfd0fcfd7368b48346a6995a91dd0edca12557773a7763
Ransom note:
Any.Run:
ID-Ransomware:
Talos FIRST (shared code identification):
Build your own FREE malware analysis VM:
Michael's Ransomware Analysis YouTube channel:
Feedback, questions, and suggestions are always welcome : )
#IDAPro #Tutorial #ReverseEngineering
-----
OALABS DISCORD
OALABS PATREON
OALABS TIP JAR
OALABS GITHUB
UNPACME - AUTOMATED MALWARE UNPACKING
-----
Original packed sample:
b1f13a9ef3da3c9bd2cfd0fcfd7368b48346a6995a91dd0edca12557773a7763
Ransom note:
Any.Run:
ID-Ransomware:
Talos FIRST (shared code identification):
Build your own FREE malware analysis VM:
Michael's Ransomware Analysis YouTube channel:
Feedback, questions, and suggestions are always welcome : )
#IDAPro #Tutorial #ReverseEngineering
Lazy String Decryption Tips With IDA PRO and Shade Ransomware Unpacked!
IDA Pro Automated String Decryption For REvil Ransomware
Decrypt String Tool
Private Key and Public Key Encryption and Decryption (Asymmetric Encryption) in Python
AES Encryption Script - Interactive Input - Cryptography with Python
Using the Bochs emulator to decrypt malware
Modern Cryptography - Hashing with MD5 - Cryptography with Python
Encrypting and Decrypting Files - Cracking Codes with Python (part 11)
Encryption and Decryption with a single line command
Encoding, RSA encryption/decryption, Decoding Example
Rustpad - Decryption Via Padding Oracle Vulnerability - BlackArch Linux #17
Simple AES Encryption - Cryptography with Python
Analyzing Adwind / JRAT Java Malware
LOMX Virus File (.Lomx) Ransomware Removal & Decrypt .Lomx Files
Password Encrypt and Decrypt ( 7 Lines of code ) | Using Cryptography | Python | #mrlazyprogrammer
Jasypt Tutorial - Jasypt APIs for encrypt/decrypt Binary Data
HLAS Virus (.hlas files) Ransomware Removal and Recover Files Guide [Updated]
Analyzing Hancitor DLL Live - Let's Build A Config Extractor!
Hashing vs Encryption Differences
Top 5 Best Ida Pro Plugins For Malware Analysis
Hex Editing [HD] #5 Encrypted Files
Encrypting Files with Ansible Vault
ZCrypt - Basic Decryption Tool | Crypto | CTF | Zsquare
Cryptographic Algorithms: Bitcoin for Developers Study Session #2
Комментарии