Analysing Real World Sample - Debugging Malicious Powershell script
Автор: CryptoW@re
Загружено: 2025-06-11
Просмотров: 112
Описание:
In this video, we dive into the world of malware analysis by debugging a malicious PowerShell sample using the built-in PowerShell debugger. 🐛💻
We've previously:
✔️ Manually deobfuscated PowerShell scripts
✔️ Written custom scripts to speed up our analysis
This time, we take a more dynamic approach—leveraging the built-in debugger to step through the script and observe its behavior in real time. You'll see how simple and effective this technique can be when working with obfuscated or malicious code.
🧪 Sample Hash (for educational purposes):
0e2527da44ae5978f11b0e475fce326ea04beff59d4f2987c7c32288ae7882fb
⚠️ Disclaimer:
Always use a sandboxed or isolated environment when working with malware samples. This video is for educational and research purposes only.
📌 Don’t forget to like, share, and subscribe if you find this useful!
💬 Have questions or want a follow-up video? Drop them in the comments below.
#PowerShell #MalwareAnalysis #CyberSecurity #ReverseEngineering #Debugging #ThreatResearch #Infosec
Повторяем попытку...

Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: