PowerShell CRYPTOSTEALER through DNS

Sdílet
Vložit
  • čas přidán 8. 05. 2023
  • j-h.io/snyk || Try Snyk to find vulnerabilities in your own code and applications FOR FREE ➡ j-h.io/snyk
    🔥 CZcams ALGORITHM ➡ Like, Comment, & Subscribe!
    🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware

Komentáře • 73

  • @Aurem_YT
    @Aurem_YT Před rokem +55

    Powershell is so cool, you never have to worry about installation. Makes it easier

    • @rodricbr
      @rodricbr Před rokem +6

      yeah, I've never had much disposal to deep learn ps but it's really cool

  • @Lampe2020
    @Lampe2020 Před rokem +17

    18:35 That looks like someone actually modified the malicious DNS record instead of just removing it XD

  • @DS6Prophet
    @DS6Prophet Před rokem +6

    John, you are an amazing Fella who always makes AAA+ quality videos! Huge props to you!! 😊
    I really have obtained lots of knowledge from your videos!

  • @manisharrora9525
    @manisharrora9525 Před rokem +8

    Already stopped the same attack thanks for this. Also did the malware analysis of the .ps1 file.

  • @justinpinson8575
    @justinpinson8575 Před rokem +1

    Love this content! Thank you for the analysis as always ❤️

  • @stopper0203
    @stopper0203 Před rokem +2

    Love these videos 😎!!

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Před rokem

    Sho talented person.
    translation master and brother.

  • @hyklmcjger9232
    @hyklmcjger9232 Před rokem

    Great video! Almost went into the rabbit hole together with you :D

  • @allurbase
    @allurbase Před rokem +3

    That UUID at the top of the script in the registry is probably to change the signature of the script.

  • @DarkFaken
    @DarkFaken Před rokem

    Thanks man!!

  • @muhammadtaha2578
    @muhammadtaha2578 Před rokem

    love your videos sir

  • @pdkama
    @pdkama Před rokem

    thanks

  • @theblankuser
    @theblankuser Před rokem

    Powershell stuff is interesting af

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Před rokem

    Great master

  • @muhammadtaha2578
    @muhammadtaha2578 Před rokem

    great

  • @Sestain
    @Sestain Před rokem

    I had this too and not sure where I had gotten it.

  • @khush1980
    @khush1980 Před rokem

    Good stuff here.. thanks
    What editor is that please

  • @luketurner314
    @luketurner314 Před rokem

    13:01 and I'm here for it

  • @demotedc0der
    @demotedc0der Před rokem

    aaawesome !!!

  • @muhammadtaha2578
    @muhammadtaha2578 Před rokem

    nice

  • @mynamesaretakenwtf
    @mynamesaretakenwtf Před rokem +12

    How are they injecting and running the PowerShell? It feels like we’re missing the initial attack.

    • @Dakktyrel
      @Dakktyrel Před rokem +6

      Phishing or adware would be my initial thoughts.

    • @UnfiItered
      @UnfiItered Před rokem

      Temp files/adware/malware. Unprotect your computer and visit as many fishy websites as you can. Then turn on your protection and watch it pick up a bunch of stuff in your temp folder.

  • @NederlandsPersoon
    @NederlandsPersoon Před rokem +9

    uuh, wtf. I found this on a pc two weeks ago, 3 PowerShell files with a name of 4 random characters with the exact same contents. I correctly identified it as a virus and did some research, after deleting it there still remained some other parts which I could not find (I am a noob on this), so wiped everything. Amazing to see a video on it

    • @NederlandsPersoon
      @NederlandsPersoon Před rokem

      I did think of sending it to you, just to see. But did not do it in the end, idk why

  • @mattchub9887
    @mattchub9887 Před rokem

    Do you ever go live??

  • @asbestinuS
    @asbestinuS Před rokem +3

    How did you get to stage 2? Did I miss something? These ps1 scripts are just reading from registry and getting values. What values are they getting?

    • @UnfiItered
      @UnfiItered Před rokem

      So after the first stage ran, it output a base64 code. He decode it and it shows a block of code. That code is the second stage.

    • @3WL2
      @3WL2 Před rokem

      Stop fast forwarding through the video and you won't have to come to the comments to ask dumb questions.

    • @asbestinuS
      @asbestinuS Před rokem +2

      @@BryanLu0 I see, thank you kind sir.

  • @raiddesu9687
    @raiddesu9687 Před rokem +5

    coolbase64 package for sublime would be useful for this kind of stuff since you do a lot of decoding ,you can just select and decode in sublime directly

    • @TechSY730
      @TechSY730 Před rokem +1

      For a moment there I thought scambot (EDIT: now banned and deleted) was doing a ^this style comment to reaffirm your suggestion.
      Which very well may be the first and only actually useful thing it did.

  • @htconex19062012
    @htconex19062012 Před rokem

    This is so crazy 😂

  • @jpsl5281
    @jpsl5281 Před rokem

    Why they store payloads as byte arrays?

    • @Sestain
      @Sestain Před rokem

      Most likely harder to detect since it needs to be put back together

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Před rokem

    More videos also following master

  • @VulcanOnWheels
    @VulcanOnWheels Před rokem

    3:23 Shouldn't that have been, "to be able to be *run*?"

  • @animeworld4775
    @animeworld4775 Před rokem

    What is crypto jacker

  • @imyoubutbetter9951
    @imyoubutbetter9951 Před rokem

    bro i m overwhelmed what programming languages do i need for cybersecurity?

  • @ytsine404
    @ytsine404 Před rokem

    😅

  • @brylozketrzyn
    @brylozketrzyn Před rokem

    One more reason to analyze DNS traffic

    • @scrpiona
      @scrpiona Před rokem

      how to? any software or tips?

    • @brylozketrzyn
      @brylozketrzyn Před rokem

      @@scrpiona Suricata + Elastic Security with Machine Learning module. Easiest, but needs ML license. Still few orders of magnitude more accessible, than some popular solutions

  • @Meletion1
    @Meletion1 Před rokem

    Second view including him!!!

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Před rokem

    One 🕐 login all

  • @onmc4754
    @onmc4754 Před rokem

    Wat

  • @logiciananimal
    @logiciananimal Před rokem +1

    Ingress/egress by DNS is so brutally annoying!

  • @chicoern
    @chicoern Před rokem +8

    Mind-blowing how these files brutally murder PowerShell. Even if you think about creating a file that doesn't make sense, to help disguise the malware, these scripts are terrible.

  • @Meletion1
    @Meletion1 Před rokem

    Lol holy 20 secs early

  • @gavithgethmin8373
    @gavithgethmin8373 Před rokem +5

    I am in sri lanka. Fifteenth yeah old.

  • @yours-truely-sir
    @yours-truely-sir Před rokem

    third

  • @pakekoding
    @pakekoding Před rokem

    They tell me to keep comment on your video to get more subs.
    so, am I need auto comment bot or something? 🤔

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Před rokem

    Codo details (echo Iymjmjimy) creation of the code different

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Před rokem

    So experience tools and codo nt mes tycopo mistake never to give up open tool hydel.

  • @commanderpaladin
    @commanderpaladin Před rokem

    The guys that saved everyone from becoming victims. GG

  • @JavierVelasco8
    @JavierVelasco8 Před rokem

    Omg i was like 1000 🥹 thank you, John. Amazing content as usual