PowerShell CRYPTOSTEALER through DNS

54,429
0
Publicado 2023-05-09

Todos los comentarios (21)
  • @Aurem_YT
    Powershell is so cool, you never have to worry about installation. Makes it easier
  • @DS6Prophet
    John, you are an amazing Fella who always makes AAA+ quality videos! Huge props to you!! 😊 I really have obtained lots of knowledge from your videos!
  • @manisharrora9525
    Already stopped the same attack thanks for this. Also did the malware analysis of the .ps1 file.
  • @justinpinson8575
    Love this content! Thank you for the analysis as always ❤️
  • @Lampe2020
    18:35 That looks like someone actually modified the malicious DNS record instead of just removing it XD
  • @allurbase
    That UUID at the top of the script in the registry is probably to change the signature of the script.
  • @hyklmcjger9232
    Great video! Almost went into the rabbit hole together with you :D
  • @NederlandsPersoon
    uuh, wtf. I found this on a pc two weeks ago, 3 PowerShell files with a name of 4 random characters with the exact same contents. I correctly identified it as a virus and did some research, after deleting it there still remained some other parts which I could not find (I am a noob on this), so wiped everything. Amazing to see a video on it
  • @khush1980
    Good stuff here.. thanks What editor is that please
  • @raiddesu9687
    coolbase64 package for sublime would be useful for this kind of stuff since you do a lot of decoding ,you can just select and decode in sublime directly
  • @Sestain
    I had this too and not sure where I had gotten it.