Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Exposing DoNex Ransomware Secrets with Malcore!

Автор: Guided Hacking

Загружено: 2024-11-22

Просмотров: 3336

Описание:

🔥 DoNex Ransomware does WHAT?
❤️ Try Malcore For FREE : https://link.malcore.io/redirect/guid...
👨‍💻 Buy Our Courses: https://guidedhacking.com/register/
💰 Donate on Patreon:   / guidedhacking  
❤️ Follow us on Social Media: https://linktr.ee/guidedhacking

©GuidedHacking - GuidedHacking™

🔗 Article: https://guidedhacking.com/threads/don...

❤️ Try Malcore For FREE : https://link.malcore.io/redirect/guid...

Donex malware sample:
https://app.malcore.io/share/67005128...

👨‍💻 Video Author: CodeNulls
👉https://guidedhacking.com/members/cod...

Code Nulls also known as Danish Khan is a professional Malware Analyst and tutor who has been making text and video tutorials for GH since 2023. He enjoys analyzing new malware samples, writing reports, and delivering threat intelligence to cybersecurity businesses. He has experience with a wide variety of tools, such as IDA Pro, x64dbg, Process Monitor, YARA, Wireshark and more, which aid him in his reverse engineering endeavors

📜 Video Description:
Malware Analysis with Malcore using DoNex ransomware as a sample. Using the malcore.io malware sandbox, I'll demonstrate how to efficiently perform malware analysis by leveraging both static and dynamic analysis features of Malcore.

I examine the malware's static properties with Malcore, analyzing file entropy imports & suspicious assembly code. The analysis reveals antidebugging imports & dynamic imports loaded at runtime, which are common techniques used by malware to evade static analysis. The string summary hints at the use of RSA encryption & typical ransomware behaviors such as deleting batch files to remove traces.

We analyze the process hollowing techniques employed by DoNex ransomware, by utilizing functions like "unmap view of file" & "create file mapping," the ransomware injects malicious code into legitimate Windows processes.Malcore's dynamic output feature logs the arguments of each function call, allowing for detailed observation of these suspicious activities. I also cover how the ransomware terminates security related processes, deletes shadow copies, & clears event logs to hinder recovery efforts.

Finally, I showcase how malcore.io's features can be used to understand & analyze malware like DoNex effectively. Whether you're using the free tier or a paid subscription, Malcore provides comprehensive tools for dynamic analysis. I encourage you to try out malcore for your own malware analysis needs.

What is Malcore?
Malcore is a malware analysis sandbox designed for static and dynamic examination of malicious software.

Who uses Malcore?
Cybersecurity researchers, malware analysts, and IT security professionals use Malcore to study and detect malware.

Why use Malcore?
Malcore provides efficient tools for analyzing binaries, identifying malicious behavior, and generating detailed reports.

How does Malcore work?
It uses advanced static and dynamic analysis to inspect file properties, detect suspicious activity, and generate YARA rules.

What is DoNex Ransomware?
DoNex Ransomware is a malware variant that encrypts files on infected systems and demands a ransom for decryption.

Where is DoNex Ransomware distributed?
It is often spread through phishing emails, malicious attachments, and compromised websites.

How does DoNex Ransomware operate?
It encrypts files using RSA and other algorithms, disables security processes, and may spread laterally across networks to maximize impact.

📝 Timestamps:
0:00 Donex Ransomware Intro
0:08 Macore Static Analysis
1:11 String Analysis & Encryption
1:57 Import Functions
3:11 Process Hollowing
4:15 Dynamic Analysis
5:07 Ransomware Tactics
6:07 Ransom Note
6:45 Malcore Features

✏️ Tags:
DoNex Ransomware
malcore.io malware sandbox
malware analysis
dynamic analysis
static analysis
ransomware behavior
anti-debugging techniques
process hollowing
malware detection
ransomware tactics
ransomware analysis tools
malware imports analysis
malcore malware analysis
malware research
ransomware

Exposing DoNex Ransomware Secrets with Malcore!

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

🕵️ Binary Refinery Tutorial 🛠️ Command Line CyberChef

🕵️ Binary Refinery Tutorial 🛠️ Command Line CyberChef

How to Extract Shellcode Using x64dbg (Malware Analysis)

How to Extract Shellcode Using x64dbg (Malware Analysis)

Malware Analysis Tools YOU COULD USE

Malware Analysis Tools YOU COULD USE

Cities Skylines II Malware [FULL REVERSE ENGINEERING ANALYSIS]

Cities Skylines II Malware [FULL REVERSE ENGINEERING ANALYSIS]

Analyzing the Zeus Banking Trojan - Malware Analysis Project 101

Analyzing the Zeus Banking Trojan - Malware Analysis Project 101

Взлом Wi-Fi: что хакер сможет сделать с вашей сетью?

Взлом Wi-Fi: что хакер сможет сделать с вашей сетью?

КАК НЕЛЬЗЯ ХРАНИТЬ ПАРОЛИ (и как нужно) за 11 минут

КАК НЕЛЬЗЯ ХРАНИТЬ ПАРОЛИ (и как нужно) за 11 минут

Cybersecurity Tool: Malware Virtual Machines (Remnux & FlareVM)

Cybersecurity Tool: Malware Virtual Machines (Remnux & FlareVM)

Dealing with a Ransomware Attack: A full guide

Dealing with a Ransomware Attack: A full guide

Изучение последних образцов вредоносного ПО

Изучение последних образцов вредоносного ПО

Анализ вредоносных программ для начинающих с помощью REMnux!

Анализ вредоносных программ для начинающих с помощью REMnux!

Malware Analysis with Any.Run | Malware Testing | Testing Viruses | Beginners

Malware Analysis with Any.Run | Malware Testing | Testing Viruses | Beginners

Анализ вредоносных программ и угроз: обходы UAC

Анализ вредоносных программ и угроз: обходы UAC

Я создал вредоносное ПО менее чем за 20 минут

Я создал вредоносное ПО менее чем за 20 минут

Dynamic Malware Analysis

Dynamic Malware Analysis

Learning Malware Analysis with NoEscape Ransomware

Learning Malware Analysis with NoEscape Ransomware

Static Malware Analysis Fundamentals

Static Malware Analysis Fundamentals

When I accidentally ran ransomware!

When I accidentally ran ransomware!

Анализ вредоносных программ стал проще: облачные расследования

Анализ вредоносных программ стал проще: облачные расследования

Разъяснение различных типов вредоносных программ | Как антивирусная программа их обнаруживает?

Разъяснение различных типов вредоносных программ | Как антивирусная программа их обнаруживает?

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]