Async RAT - Batch Obfuscation

  Рет қаралды 141,985

John Hammond

John Hammond

2 жыл бұрын

Check IPinfo online and sign up for free exploring any IP address you would like! ipinfo.io/
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
PayPal: paypal.me/johnhammond010
E-mail: johnhammond010@gmail.com
Discord: johnhammond.org/discord
Twitter: / _johnhammond
GitHub: github.com/JohnHammond
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer smart completions and documentation. www.kite.com/get-kite/?... (disclaimer, affiliate link)

Пікірлер: 205
@liminal548
@liminal548 2 жыл бұрын
The Chinese chars is due to the first two characters in the script, it makes editors think its UTF-16 and thus messes up all the characters. While cmd.exe has no issue processing it.
@theimperious1
@theimperious1 2 жыл бұрын
thats a neat trick
@sangamo38
@sangamo38 2 жыл бұрын
this is exactly what my guess was.
@SadKris
@SadKris 2 жыл бұрын
I did not know this. Sounds fun
@rdil
@rdil 2 жыл бұрын
Wow.
@andrewjehen5910
@andrewjehen5910 2 жыл бұрын
Tu fu fuf fufu CHINA wuhan bat virus NIH ECOHEALTH LAB LEAK
@dinoscheidt
@dinoscheidt 2 жыл бұрын
Tbh not boring at all. As an engineer who seems to write more in word, excel and PowerPoint nowadays, I love to have your longer videos playing in the background while working. Much love from Berlin ❤️
@alexvidal821
@alexvidal821 2 жыл бұрын
One more in Berlin ❤️
@SpaceCatCat
@SpaceCatCat Жыл бұрын
2 more*
@funil6871
@funil6871 Жыл бұрын
grüße aus dem westen
@paydayvideos4924
@paydayvideos4924 Жыл бұрын
@@SpaceCatCat still just 2
@Bobtb
@Bobtb 2 жыл бұрын
Wasn't boring at all, watching you do your thing. I did learn a few new tricks today!
@andydataguy
@andydataguy 2 жыл бұрын
Awesome video! Just getting into programming and it's inspiring to see whats possible. I loved being able to see into your investigatory mind and thought processes as you faced problems
@ivanboiko8975
@ivanboiko8975 2 жыл бұрын
Thank you John, we definitely need such so detailed videos about malware! So interesting, so useful!
@jimvincentmartinez7485
@jimvincentmartinez7485 2 жыл бұрын
Not boring at all. Finished the video without skipping.
@chrisclark5135
@chrisclark5135 2 жыл бұрын
Excellent John! Not one bit boring man - thanks for all you do!
@MygenteTV
@MygenteTV Жыл бұрын
I had been following many youtubers for years but after finding your channel I don't even need to do it no more. your stuff is just crazy.
@wnathanielw
@wnathanielw 2 жыл бұрын
I absolutely love these! Please don't stop doing them
@BIGAPEGANGLEADER
@BIGAPEGANGLEADER 2 жыл бұрын
Wow this was incredibly entertaining and educational, I can't believe youu were worried that it would be boring! I really hope you make more videos like this, seriously! This is really exciting to watch (as sad as that sounds haha). Would love to make a career out of this sort of analysis.
@applePrincess
@applePrincess 2 жыл бұрын
"That's not bat! That's not BAT!" while you looking a bunch of Chinese characters made my day! nice video 👍
@bobmars8771
@bobmars8771 2 жыл бұрын
@Not Convinced 🤣🤣 Lol man
@LordRaven256
@LordRaven256 Жыл бұрын
As pointed out before, the whole trick relies on setting UTF bits at the start of the file, making the text editor assume it UTF-16 or (8). You can get around this very easily by enforcing a specif encoding (before or after) opening the file. The editor I use (UltraEdit) can do this very easily and I assume most other (advanced) text editors can do the same. So this is not really a very effective obfuscation. The setting of the R variable and then using letters from it in the code is much more effective in my opinion. While easily turned back into valid commands by a PC, a raw text analysis will not find anything there.
@Harrowthe12
@Harrowthe12 2 жыл бұрын
I've waited for another one of these to come out very patiently. Worth it.
@Endzeitpanda
@Endzeitpanda 2 жыл бұрын
You the best, John! It was neither boring nor too quit or anything. Had a blast as always!
@mytube7473
@mytube7473 2 жыл бұрын
Amazing. Never seen anyone break down malware before. very cool & smart.
@davidmiller9485
@davidmiller9485 2 жыл бұрын
unless he's doing a CTF most of his content is a break down of malware.
@NotFab
@NotFab 2 жыл бұрын
Hey John, thanks for the video! You probably noticed by now but at 44:48 you missed the function call to KnqbWpjtoveF around the base64 string, which is probably an AES-256 decode on the string and the reason why you were not able to base64 decode them.
@TagnumElite
@TagnumElite Жыл бұрын
Ah, great thing I read your comment. I can alteast now abandon this.
@trapOrdoom
@trapOrdoom Жыл бұрын
I love the long format vids. Even when they’re old, I feel like I’m talking with you.
@jackchan5635
@jackchan5635 2 жыл бұрын
Love it! really enjoy watching your malware analysis👍
@sordavie
@sordavie 2 жыл бұрын
Thanks for making these videos John.
@gnastyg7798
@gnastyg7798 7 ай бұрын
Good Stuff John!!
@moom8254
@moom8254 2 жыл бұрын
amazing video! always loved your work!
@tecra3toshiba149
@tecra3toshiba149 2 жыл бұрын
Thank you! Just following along. Reminded me of some weird things from yrs ago.
@Cyanid3-VX
@Cyanid3-VX 2 жыл бұрын
Great video! I love these deep dives.
@debarghyamaitra
@debarghyamaitra 2 жыл бұрын
John always the best reverse engineer
@b.tulsirao7724
@b.tulsirao7724 2 жыл бұрын
wow...amazing video...Thanks a lot for all this knowledge shared with us.
@1hw3
@1hw3 11 ай бұрын
I really liked this video, I've been trying to get into stuff like this and you help :D ty and pls keep doing this!
@Alex-nq5nz
@Alex-nq5nz 2 жыл бұрын
You and Mr. Bombal are my inspiration!
@Alex-nq5nz
@Alex-nq5nz 2 жыл бұрын
ALWAYS great contents!!!
@albertsaeznunez8875
@albertsaeznunez8875 2 жыл бұрын
I love that KZfaq bitrate compression when he is looking at the obfuscated Chinese bat file
@qqb0t
@qqb0t 2 жыл бұрын
Sick video ! More like this please ! :)
@jacklee1612
@jacklee1612 2 жыл бұрын
This is such a rich content, not boring at all !
@Trezc0
@Trezc0 2 жыл бұрын
Hey John, thanks so much for the content, quality was just fine - also ty for the ipinfo ad! I saw the video yesterday and actually had a great use case for the API just today at work for some attack analysis lol. Btw just wondering, how would one go about sending you a "juicy file"? Someone sent me a very obvious Node.JS RAT from a compromised discord account pretending to be a game, and thought this could be interesting for you, looks pretty powerful.
@lightningdev1
@lightningdev1 2 жыл бұрын
You can dm it to him on Discord
@daleryanaldover6545
@daleryanaldover6545 2 жыл бұрын
it's night time here as well, watching as I sip my coffee ☕
@readypubggo5650
@readypubggo5650 2 жыл бұрын
This is it, the wait has finaly come to an end.
@yassinebellal1671
@yassinebellal1671 Жыл бұрын
Thanks a lot John, i learned some new tricks
@bobbychingchang8811
@bobbychingchang8811 2 жыл бұрын
Can't wait for this video
@victorcascallar6745
@victorcascallar6745 2 жыл бұрын
Dude, how can you talk for pretty much an hour straight and say you were quiet? Amazing, very fun. I'm starting to learn Linux because of you :) I'm a little bit old (almost 30 now), and idk why but going thru the command line reminds when I was a kid with the new and hot windows 98. The whole experience is new to me.
@MisterK-YT
@MisterK-YT 2 жыл бұрын
This was riveting to me. Seeing this process in real-time from A → Z as you yourself figure it out is the most educational way this could’ve possibly been conveyed (to me). Thanks!
@ambrosiahasnevertastedthis3673
@ambrosiahasnevertastedthis3673 Жыл бұрын
adhd normally does not let me sit through such long videos without getting bored. i was sad when this video ended
@Kurowe.
@Kurowe. 2 жыл бұрын
You keep saying "Echo" and my Alexa is set to respond to Echo and she's freaking out lmao xD
@user-ll8hy1lv5l
@user-ll8hy1lv5l Жыл бұрын
thnx men, you are great, gave me a bunch of ideas
@CrowTheArchfiend
@CrowTheArchfiend 2 жыл бұрын
I have to wake up in 7 hours. Make that 6 now. I love this content. I actually want to just jump into doing stuff like this myself
@Maldroid
@Maldroid 2 жыл бұрын
I like the fact that he is also experimenting in his video, and is not straight up tutorial video.
@TealTunic
@TealTunic 2 жыл бұрын
Most underrated yt channel. Love the videos, man! ❤
@viv_2489
@viv_2489 2 жыл бұрын
"I hate this part of the video" 😂 John at his best 😂, nice content 👌🙏
@CJMAXiK
@CJMAXiK 2 жыл бұрын
John: oo, I've found a python bat deobfuscator in the obfuscated code, neat! Also John: _proceeds to manually deobfuscate the code anyway_
@user-zt5bq9tf2z
@user-zt5bq9tf2z 2 жыл бұрын
there was only an obfuscator and no deobfuscator...
@amirmohamed8748
@amirmohamed8748 2 жыл бұрын
Waww , really hilarious , you are on another level . U r the best . Hope i'll reach this level .
@paxdriver
@paxdriver 2 жыл бұрын
That's some wicked poor lol great vid thanks man. Audio fine
@froststorm77
@froststorm77 2 жыл бұрын
This was intersting, watching whole hour.
@kajoma1782
@kajoma1782 2 жыл бұрын
You could go to *Preferences* > *Network* > Click the plus icon on the right side of the window. In your virtual machine settings you could set the network interface to "NAT Network". Do this so that you don't have to bridge to your *real* network.
@csongorszecska
@csongorszecska 2 жыл бұрын
Pooth. Btw %0 is the file being executed in batch and %~F0 will expand to the full path of the file
@gregoryjones4539
@gregoryjones4539 2 жыл бұрын
Love the video as i am a recovering addict and looking in to going in to it not sure which part yet looking at a little of everything any advice on where to start as a novist/ beginner thanks for the video
@Lei_Wong
@Lei_Wong 2 жыл бұрын
Very entertaining episode
@Autokey_Security_Services
@Autokey_Security_Services 2 жыл бұрын
As I have taught myself many things in life I hope to some day be able to write software and disassemble software.. I remeber buying c++ books when I was a kid but It never got my attention.. Hopefully soon I will possess this knowledge I just don't know where to start.. It so cool how all that code was hidden in a little batch file...
@laurenlewis4189
@laurenlewis4189 2 жыл бұрын
Sleepytime Malware Analysis is my favorite ASMR channel on KZfaq
@MrRobertX70
@MrRobertX70 2 жыл бұрын
Fascinating bat file.
@Ged325
@Ged325 2 жыл бұрын
50 minutes: This is the same code pattern as seen in your snip3 crypter/Rat video. (about an hour in). Essentially it first decodes the base64 string. Then uses the WF function to decrypt the decoded strings.
@viat8711
@viat8711 Жыл бұрын
it's amazing videos. thx for it
@_hackwell
@_hackwell 2 жыл бұрын
very interesting video ! learnt a lot as I'm not used to Windows stuff. anyway do you plan making videos about SANS hhc 2021 ? Would be interesting by comparing our different approaches
@JustSomeAussie1
@JustSomeAussie1 2 жыл бұрын
I came across a batch file with Chinese in it once, all i had to do was change the character encoding in sublime text and it fixed it
@alnoiseplaysmc
@alnoiseplaysmc Жыл бұрын
Find someone who loves you as much as John loves his malware
@iddqds
@iddqds 2 жыл бұрын
i know nothing about what he does but very interesting to watch for sure. i try to put things in order in my mind but still don't understand anything. what does that thing do, how can he know all this thing and etc. hey john i wonder where do you think i should start as complete beginner? i have some free time and would love to spend on what you do.
@ishaankapoor933
@ishaankapoor933 2 жыл бұрын
Please Give us more of such unedited videos
@logiciananimal
@logiciananimal 2 жыл бұрын
Note that K. only detects the origina because it is obsfucated batch, not anything more specific.
@MrPing-jh4tl
@MrPing-jh4tl 2 жыл бұрын
Nice video Hammond
@azizutkuozdemir
@azizutkuozdemir 2 жыл бұрын
whhhaaaattt batch obfuscationnnn ! youuu shinanigenssss
@IanGrigg1
@IanGrigg1 2 жыл бұрын
I can't remember, are these samples available for us to practice along with the video?
@sendlocation8476
@sendlocation8476 Жыл бұрын
@John Hammond Which RAT do you recommend? I am using NJRat at the moment. Also which open source Crypter do you recommend and where can I get it from? Need to undetected on Windows 10/WinDefender/AV
@notafurrysogoaway
@notafurrysogoaway Жыл бұрын
What's updog? Also, why do you use separate 'cd' commands in cmd? 'cd Desktop/batch' works fine too, cd takes a relative path.
@AvinashKumar-fe8xb
@AvinashKumar-fe8xb 2 жыл бұрын
Crazy crazy stuff here :)
@nvevesthetic
@nvevesthetic 2 жыл бұрын
dear john hammond are you using ubuntu or linux in general as full time like a daily driver ?
@sylvainrocca-serra3402
@sylvainrocca-serra3402 2 жыл бұрын
the base64 strings are probably aes encrypted then base64 encoded so it's printable, and the random next network stuff got me thinking of fast flux dns resolution to connect to a C2C server that keeps changing it's dns. maybe, maybe not i just though id share my thoughts, nice video as usual :) quite interesting piece of malware
@trunovmichael
@trunovmichael 2 жыл бұрын
Port 9001 is commonly used on TOR. Perhaps that's why you did not find clear host destination.
@Yuki-bk2my
@Yuki-bk2my 2 жыл бұрын
the variable names at 16:25 made me laugh because they are what i use when im testing something and need a quick variable name
@joefawcett2191
@joefawcett2191 2 жыл бұрын
poggers
@brock_-1542
@brock_-1542 2 жыл бұрын
39:43 malware analyst moment
@johnpathe
@johnpathe 2 жыл бұрын
nah, "did i just dox my[self/company]?" moment
@hozehd8246
@hozehd8246 Жыл бұрын
I know I'm late, but bro same, once he continued I couldn't stop laughing, I was like "Tf Is my bro doing? Rethinking life choices?!?" lmfao
@serversideissues4249
@serversideissues4249 2 жыл бұрын
Would you be willing to share the decoded sample? I know it's been a while since you made this video. I used to RE malware at my previous position and was curious if I might be able to.
@lfcbpro
@lfcbpro Жыл бұрын
I'm curious, this obviously takes a lot of time to write, and to implement, with a lot of skill, what do they get out of it? where is the profit? Is it just to take over someone's computer? Or are they after doing more once they have control?
@albaniaiptv8335
@albaniaiptv8335 2 жыл бұрын
you should run part of code to get the output encoded strings
@Deathyss
@Deathyss 2 жыл бұрын
At 44:40, when you looking at the base64 stuff.. They call an other method with the result of base64, and after changing the Encoding. Thats prolly why only getting the base64 from the string didnt do a lots for you. I guess...
@kQle
@kQle 2 жыл бұрын
Very interesting stuff mah gai
@lucien5112
@lucien5112 2 жыл бұрын
unironically says updog
@chrisbitus1328
@chrisbitus1328 2 жыл бұрын
HOHN JAMMOND - see I obsfucated his name ;) Classis substitution cipher technique that even the most recent malwares deploy.
@maryalison1321
@maryalison1321 2 жыл бұрын
Hi Chris 👋 I hope my comment didn't sound as a form of privacy invasion your comment tells of a wonderful woman with a beautiful heart which led me to comment I don't normally write in the comment section but I think you deserve this complement. If you don’t mind can we be friends? Thanks God bless you….
@CZghost
@CZghost 2 жыл бұрын
Would be good to investigate which protocol connects to the IP address. Obviously that address is stored somewhere in the encrypted data, including the port. Reverse shell lets the computer at the other side control your computer. What if the process could be reversed? Now you have the IP address, their reverse shell server has to be exposed to the public somehow. Anyway, it would be good to report for authorities.
@LinuxJedi
@LinuxJedi 2 жыл бұрын
" i didn’t write it down " john forgets he’s recording 🤣
@user-em2kf6ff4v
@user-em2kf6ff4v 6 ай бұрын
?Need a Tutor in this field so that I can get a walk through. I just enrolled in Salem University???
@IkarusKommt
@IkarusKommt 2 жыл бұрын
How that thing is supposed to work? Do people generally use an administrator account with UAC turned off?
@MrJoymaggot
@MrJoymaggot 2 жыл бұрын
Could that be just the .length method to define the C2 IP by octets?
@googleuser298
@googleuser298 2 жыл бұрын
how can I start doing stuff like this? IS there a site that has a path for reverse engineering like this?
@tamiryosef9616
@tamiryosef9616 2 жыл бұрын
How do you know all these things? What course do you learn ?
@Dopamine-Dealer
@Dopamine-Dealer 2 жыл бұрын
That is pretty cool
@sioonhho
@sioonhho 2 жыл бұрын
babe wake up, new malware analysis video
@willk7184
@willk7184 2 жыл бұрын
"That did not like ... whatever was happening." 😂
@TheJustinist
@TheJustinist 2 жыл бұрын
One thing you could have done is write a script to parse the file for %r:N,n (case insensitive) and replace the matches with the correct value in the seed value
@bobnoob1467
@bobnoob1467 2 жыл бұрын
I dont know if im going crazy but I can't find your resume video anymore haha
@Sqwince23
@Sqwince23 2 жыл бұрын
Did YOU figure it out as ASYNCRAT or was it windows defender that did the heavy lifting here?
@RandomytchannelGD
@RandomytchannelGD Жыл бұрын
13:54 THE CLS IS THERE BECAUSE ITS ECHO OFF NOT @ECHO OFF
@megalithos-dev
@megalithos-dev 2 жыл бұрын
Please do videos on PE malware analysis.
@krokodaun
@krokodaun Жыл бұрын
15:13 yes it does set name = whatever 123 variable echo %name %
@netgian7389
@netgian7389 2 жыл бұрын
I'd love to see the batchfile, can you share it?
@MrDrgdf
@MrDrgdf Жыл бұрын
54:41 " ॐ ख " 🤣🤣🤣
@Michael_Schmatzberger
@Michael_Schmatzberger 2 жыл бұрын
I don't understand anything he does but that was still fun to watch. Did he "run" parts of the malware in his command promt tab to see what they do? If so, why do people obfuscate their code anyway?
@Stagnating_
@Stagnating_ 2 жыл бұрын
Main purpose of obfuscation is usually to evade anti-virus detection
@tomysshadow
@tomysshadow 2 жыл бұрын
Obfuscation is always possible to get around, but it does slow things down.
Mozi Malware - Finding Breadcrumbs...
50:16
John Hammond
Рет қаралды 196 М.
Bypassing SmartScreen on Web Browsers
17:31
John Hammond
Рет қаралды 22 М.
Өшкен сезімдер қайта лаулады!
24:31
QosLike / ҚосЛайк / Косылайық
Рет қаралды 581 М.
ОПЯТЬ СИРЕНА ВКЛЮЧАЕТСЯ!?😲😲😲
00:56
Chapitosiki
Рет қаралды 41 МЛН
How to Sneak Make Up Into Class 💄 #shorts
00:30
BubbleBee
Рет қаралды 7 МЛН
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS
1:42:04
John Hammond
Рет қаралды 490 М.
Analyzing The Prolific Open-Source AsyncRAT Malware
19:22
Grant Collins
Рет қаралды 2,8 М.
Uncovering NETWIRE Malware - Discovery & Deobfuscation
59:46
John Hammond
Рет қаралды 89 М.
Unraveling the IcedID Malware Stager & Phishing Email
33:34
John Hammond
Рет қаралды 77 М.
He tried to hack me...
34:15
John Hammond
Рет қаралды 371 М.
Unraveling a REMOTE ACCESS TROJAN (VBScript Deobfuscation)
31:20
John Hammond
Рет қаралды 159 М.
Bruteforcing MFA & Fail2ban Manipulation - TryHackMe! (Biteme)
44:38
Obfuscate Python Code With PyArmor
11:22
NeuralNine
Рет қаралды 44 М.
Өшкен сезімдер қайта лаулады!
24:31
QosLike / ҚосЛайк / Косылайық
Рет қаралды 581 М.