Hands-on Ransomware: Exploring Cybercrime
54,568
Published 2023-06-05
My Lockbit tweet: twitter.com/_JohnHammond/status/157256282487823974…
00:00 - Ryan Chapman, Malware Analyst
00:30 - Introduction
04:29 - First Demo
07:29 - Configuring RAASNet
15:58 - Building RAASNet
18:17 - Detonating RAASNet
21:41 - Builder Archive
23:37 - Second Demo
26:20 - Building Yashma
27:54 - Third Demo
30:08 - Configuring Lockbit
35:01 - Building Lockbit
37:50 - Final Thoughts
🔥 YOUTUBE ALGORITHM ➡ Like, Comment, & Subscribe!
🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
All Comments (21)
-
I’d love to see more of Ryan, hoping he’ll start his own yt channel
-
Extremely informative. I'd love to see Ryan discussing malware analysis as he mentions at the video's end. Much appreciated Ryan and John!
-
Thank you! The shadowy world relies on secrecy and silence. This effort to teach and explore is so important. The more light you shine, and the more sparks of interest it inspires, the less room there is for the darkness.
-
Great content! Good to see that you synced up with John Hammond! Keep up the great work Ryan!!
-
Really enjoyed this, john!
-
Thanks for this Type of Content
-
Wild to see an old work buddy on one of my favorite YouTube channels.. go Ryan!
-
Some of the best cysec content on planet earth. Thanks Ryan. Killer vid
-
Great content and advisors.. Thanks for keeping this topic in the front of the line!
-
Really amazing👍!
-
Love the video!
-
Waiting for Ryan's Malware analysis things and how he does it in real world cases.
-
Finally 🔥🔥🔥🔥🔥🔥🔥🔥😘😘😘😘😘😘
-
that was very interesting
-
Wow♥️‼️
-
26:46 The ASCII art actually broke the builder. Probably would have worked if you took it out. Whoever wrote that should sanitize their strings…
-
This man really like to talk, thx it was interesting.
-
It's happened before, it will happen again! I saw something similar in the 90's. VCL, IIRC, by Nowhere man of nuke. It was a DOS TUI for creating viruses and the like. It was basically an x86 ASM code generator. You'd select type: com, exec infectors, droppers, etc... type of payload, custom strings and the like. It was password protected, but, if you were skilled with debug tools, you could extract it.
-
The nanocore of ransomware
-
There was actually an option to change the extension when building it. You just skipped past that screen.