Analyzing the FBI's Qakbot Takedown Code (Malware Analysis & Reverse Engineering)
Автор: Anuj Soni
Загружено: 2023-09-07
Просмотров: 6979
🚀 Build real confidence analyzing malware. Join the waitlist. 🚀
https://go.themalwarelab.co/join
📄 Get my malware analysis template 📄
https://go.themalwarelab.co/get-template
🎥 Video Description 🎥
In this video, we analyze the FBI's Qakbot takedown code using malware analysis techniques.
⏱️ Timestamps ⏱️
0:00 - Intro
1:21 - Shellcode analysis with Malcat
7:23 - Identify functionality with Mandiant's capa
10:41 - Analyze shellcode with Ghidra
15:35 - Debug shellcode with runsc
19:40 - Review decoded executable with PEStudio
21:07 - Code analysis to confirm how Qakbot is terminated (warning: screen flickers here for a few seconds due to a recording error)
😈 Sample: https://github.com/as0ni/youtube-file...
🔑 Password: infected
Unzipped SHA-256: 7cdee5a583eacf24b1f142413aabb4e556ccf4ef3a4764ad084c1526cc90e117
Description: FBI Qakbot Takedown Code
🛠️ Tools 🛠️
Malcat: https://malcat.fr/
Ghidra: https://ghidra-sre.org/
Capa: https://github.com/mandiant/capa
Capa Rules: https://github.com/mandiant/capa-rules
Speakeasy: https://github.com/mandiant/speakeasy
x64dbg: https://x64dbg.com/
Runsc: https://github.com/edygert/runsc
📞 Follow Anuj on LinkedIn: / sonianuj
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: