У нас вы можете посмотреть бесплатно Malicious AutoIT | Malware Analysis | Decompilation | PE Analysis with Detect It Easy | Let's Defend или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
🔬 Let's Defend Malicious AutoIT Challenge | Static Malware Analysis & Reverse Engineering In this video, I analyze a malicious AutoIT-compiled executable from the Let's Defend SOC platform. We perform static analysis to uncover C2 domains, decode embedded payloads, and understand the malware's code injection techniques using CallWindowProcW. 📋 CHALLENGE OVERVIEW: The SOC has detected suspicious AutoIT script activity. We analyze a compiled AutoIT executable (sample.exe) to extract IoCs, identify command & control infrastructure, and understand the malware's execution flow without detonating it in a sandbox. 🛠️ TOOLS USED: • 7z - Extract password-protected malware archive (password: infected) • md5sum - Calculate file hashes for IoC tracking • Detect It Easy (DIE) - PE file analysis (entropy, sections, timestamps) • bulk_extractor - Automated artifact extraction from binaries • autoit-ripper - AutoIT script decompiler (Python tool) • Virtual Environment (venv) - Isolated Python environment for analysis 🎯 TECHNIQUES COVERED: ✓ Password-protected malware sample extraction (7z archives) ✓ MD5 hash calculation for malware identification ✓ PE file structure analysis (sections, entropy, entry points) ✓ Entropy analysis for detecting packed/encrypted binaries (6.58565) ✓ Virtual address and entry point identification ✓ Timestamp analysis (compilation date: 2020-02-26) ✓ AutoIT script decompilation and reverse engineering ✓ C2 domain extraction from embedded code ✓ Hexadecimal string decoding (file paths) ✓ Windows API call analysis (CallWindowProcW) ✓ DLL injection technique identification 🧩 MALWARE BEHAVIOR ANALYSIS: The AutoIT malware performs the following operations: 1. Downloads two encoded payloads (Pay.txt, Run.txt) from C2 server 2. Decodes hex-encoded strings and replaces obfuscation markers 3. Creates DLL structures for shellcode in memory 4. Uses CallWindowProcW API for process injection 5. Targets Windows System32 directory for persistence 🔗 RESOURCES: • Let's Defend Challenge: https://app.letsdefend.io/challenge/m... • autoit-ripper GitHub: https://github.com/nazywam/AutoIt-Ripper • Detect It Easy (DIE): https://github.com/horsicq/Detect-It-... • bulk_extractor: https://github.com/simsong/bulk_extra... • AutoIT Official: https://www.autoitscript.com/ • CallWindowProcW MSDN: https://learn.microsoft.com/en-us/win... 🎓 PERFECT FOR: • Malware analysts learning static analysis • SOC analysts identifying AutoIT-based threats • Reverse engineers studying obfuscation techniques • OSCP students (malware analysis awareness) • Blue team defenders hunting AutoIT malware • Anyone learning PE file analysis ⚠️ CRITICAL LEARNING POINTS: • AutoIT is a legitimate scripting language often weaponized by threat actors • Entropy values above 6.0 typically indicate packing/encryption • CallWindowProcW is a common API for shellcode injection • Always analyze malware in isolated environments • IoC extraction enables proactive threat hunting 💬 Have you encountered AutoIT malware in your SOC? Share your experience below! 🔔 Subscribe for more malware analysis, Let's Defend challenges, and reverse engineering content!