Hands-on Ransomware: Exploring Cybercrime

Check out what Ryan is up to: / rj_chap
My Lockbit tweet: / 1572562824878239745
00:00 - Ryan Chapman, Malware Analyst
00:30 - Introduction
04:29 - First Demo
07:29 - Configuring RAASNet
15:58 - Building RAASNet
18:17 - Detonating RAASNet
21:41 - Builder Archive
23:37 - Second Demo
26:20 - Building Yashma
27:54 - Third Demo
30:08 - Configuring Lockbit
35:01 - Building Lockbit
37:50 - Final Thoughts
🔥 KZread ALGORITHM ➡ Like, Comment, & Subscribe!
🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware

Пікірлер: 64

  • @creengton8594
    @creengton859411 ай бұрын

    I’d love to see more of Ryan, hoping he’ll start his own yt channel

  • @rj_chap

    @rj_chap

    11 ай бұрын

    Much appreciated! I have a channel @ryanchapmanj, but I don't curate content like our man John here. I mostly add my various presentations to my playlists, as they are often hosted elsewhere.

  • @ThisIsJustADrillBit
    @ThisIsJustADrillBit11 ай бұрын

    Thank you! The shadowy world relies on secrecy and silence. This effort to teach and explore is so important. The more light you shine, and the more sparks of interest it inspires, the less room there is for the darkness.

  • @rj_chap

    @rj_chap

    11 ай бұрын

    Agreed!

  • @DDBAA24

    @DDBAA24

    11 ай бұрын

    Tyler Durden , interesting handle.. 1st rule of fight club ?

  • @ThisIsJustADrillBit

    @ThisIsJustADrillBit

    11 ай бұрын

    @@DDBAA24 I've read the ending :)

  • @cyberguide_in
    @cyberguide_in11 ай бұрын

    Extremely informative. I'd love to see Ryan discussing malware analysis as he mentions at the video's end. Much appreciated Ryan and John!

  • @reanimationxp
    @reanimationxp11 ай бұрын

    Wild to see an old work buddy on one of my favorite KZread channels.. go Ryan!

  • @rj_chap

    @rj_chap

    11 ай бұрын

    Heya! Good to see you too!

  • @user-vp7ld6qb1x
    @user-vp7ld6qb1x11 ай бұрын

    Great content! Good to see that you synced up with John Hammond! Keep up the great work Ryan!!

  • @axjv
    @axjv11 ай бұрын

    26:46 The ASCII art actually broke the builder. Probably would have worked if you took it out. Whoever wrote that should sanitize their strings…

  • @rj_chap

    @rj_chap

    11 ай бұрын

    I wouldn't be surprised if many builders had input sanitization issues. In fact, that could be a cool research project/video! "How many builders can be break with silly input?" Fun idea!

  • @lightningdev1

    @lightningdev1

    11 ай бұрын

    Yeah. C# probably didn't like the unescaped backslashes .

  • @CosmodiumCS
    @CosmodiumCS11 ай бұрын

    Really enjoyed this, john!

  • @tmcarter3
    @tmcarter311 ай бұрын

    Great content and advisors.. Thanks for keeping this topic in the front of the line!

  • @PS_Fantasy
    @PS_Fantasy11 ай бұрын

    Thanks for this Type of Content

  • @Jesse_Johnson
    @Jesse_Johnson11 ай бұрын

    Some of the best cysec content on planet earth. Thanks Ryan. Killer vid

  • @AM-og2oi
    @AM-og2oi11 ай бұрын

    Love the video!

  • @sutfuf6756
    @sutfuf675611 ай бұрын

    It's happened before, it will happen again! I saw something similar in the 90's. VCL, IIRC, by Nowhere man of nuke. It was a DOS TUI for creating viruses and the like. It was basically an x86 ASM code generator. You'd select type: com, exec infectors, droppers, etc... type of payload, custom strings and the like. It was password protected, but, if you were skilled with debug tools, you could extract it.

  • @WanderlustVisual5
    @WanderlustVisual511 ай бұрын

    Waiting for Ryan's Malware analysis things and how he does it in real world cases.

  • @guilherme5094
    @guilherme509411 ай бұрын

    Really amazing👍!

  • @hackwithprogramming7849
    @hackwithprogramming784911 ай бұрын

    Finally 🔥🔥🔥🔥🔥🔥🔥🔥😘😘😘😘😘😘

  • @anivibe7322
    @anivibe732211 ай бұрын

    This man really like to talk, thx it was interesting.

  • @woritsez
    @woritsez11 ай бұрын

    that was very interesting

  • @lordlightspeed
    @lordlightspeedАй бұрын

    There was actually an option to change the extension when building it. You just skipped past that screen.

  • @ian562ADF52E
    @ian562ADF52E11 ай бұрын

    That login is ridiculously easy to bypass. Just supply a profile dictionary object and execute the code in the last if statement in the login function.

  • @popeyehacks
    @popeyehacks11 ай бұрын

    Wow♥️‼️

  • @Lodakia
    @Lodakia11 ай бұрын

    I may have missed this if it was already answered in the video. But is the VM image he's using with all of those analysis programs on the desktop publicly available?

  • @jonuldrick

    @jonuldrick

    11 ай бұрын

    I would bet that you would have to build it out yourself. You might get something similar by taking the SANS course he is teaching.

  • @ArthursHD

    @ArthursHD

    11 ай бұрын

    🏴‍☠It's not legal to re-distribute Windows. I Bet it's not available even if it were I would not trust it cause it is modified.

  • @Aaron199s

    @Aaron199s

    11 ай бұрын

    Flare VM from Mandiant has a large collection of useful malware analysis/reverse engineering tools.

  • @InuYasha-SitBoy
    @InuYasha-SitBoy3 ай бұрын

    i wonder if any ransomware type crypters have ever used something like sdelete to overwrite empty space on disk to mitigate possible file recovery. or just create a file that eats up free space than deletes after disk is full

  • @ronin0x_
    @ronin0x_11 ай бұрын

    Hello John, can you review PNPT certification? How the course is, and what are the preps to do for the exam. And suggestions for machines to do in THM and HTB. It'll be helpful for me to uptake the certification 🥺

  • @onmc4754
    @onmc475411 ай бұрын

    The nanocore of ransomware

  • @RoomTwentyNine
    @RoomTwentyNine11 ай бұрын

    Cool

  • @slr150
    @slr15011 ай бұрын

    16:35 Rust doesn't have a runtime!

  • @gooniesfan7911
    @gooniesfan791111 ай бұрын

    Can u do video on LOLDrivers

  • @bhagyalakshmi1053
    @bhagyalakshmi105310 ай бұрын

    Medal

  • @monthoramemi1937
    @monthoramemi193711 ай бұрын

  • @wwdevil8771
    @wwdevil877111 ай бұрын

    How did you get the password for the 7z?

  • @wwdevil8771

    @wwdevil8771

    11 ай бұрын

    Infected

  • @MaisonKrown

    @MaisonKrown

    6 ай бұрын

    ​@wwdevil8771 it tells me header incrypted, any idea?

  • @Gobillion160
    @Gobillion16011 ай бұрын

    w vid

  • @AlienWarTycoon
    @AlienWarTycoon4 ай бұрын

    I'd like to know what coffee Ryan drinks. I'll have some of that please.

  • @AndokDev
    @AndokDev11 ай бұрын

    I think i found my new VXUG love xoxo

  • @arunrmyt
    @arunrmyt11 ай бұрын

    Wow this is old LockBit though. New versions have made the decrytor not available on the system. They are preparing this on thir systesm and dropping to the victim.

  • @jugalchaudhary8943
    @jugalchaudhary894311 ай бұрын

    how can we stop lockbit ramsomeware from getting into my computer?

  • @spookyleo2589

    @spookyleo2589

    11 ай бұрын

    i think we can't do much on your computer 😂 (good question tho)

  • @iam-py-test

    @iam-py-test

    11 ай бұрын

    I could be wrong, but I don't think LockBit targets home users.

  • @jugalchaudhary8943

    @jugalchaudhary8943

    11 ай бұрын

    @@iam-py-test I researched a bit, I think it targets vm files, I could also be wrong

  • @jugalchaudhary8943

    @jugalchaudhary8943

    11 ай бұрын

    @@spookyleo2589 you could use prelude detect to see if your pc can be affected by it or not, it does lot of tests and detects it

  • @kimobonbon7
    @kimobonbon711 ай бұрын

    im the 12th person to comment 13th*

  • @bader.office
    @bader.office11 ай бұрын

    pliz pass for vx-underground, folders

  • @AnimeeHints

    @AnimeeHints

    10 ай бұрын

    infected

  • @AgentM124
    @AgentM12411 ай бұрын

    Ronsomeware

  • @nullkv
    @nullkv11 ай бұрын

    я тоже могу рассказать как использовать билды, ума для этого не нужно. Очень конечно интересно. Но суть Не понял. Зачем рассказывать как работают билдеры этих зловредов.

  • @landless-wind
    @landless-wind11 ай бұрын

    mga bisaya

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked11 ай бұрын

    Early :3

  • @thenesquicc
    @thenesquicc11 ай бұрын

    First

  • @x3nooo
    @x3nooo11 ай бұрын

    bro no don't show this shit to skiddies

  • @Diemf74
    @Diemf7411 ай бұрын

    Now the only problem for script kiddies is to encrypt their build.

  • @Diemf74
    @Diemf7411 ай бұрын

    "Dont download this" 😂 then stop showing us this. If you never showed it in the firstplace a lot of the low hanging fruit wouldnt exist like it does.

  • @DDBAA24
    @DDBAA2411 ай бұрын

    Can we look at UFOnet, b0tnet . Its strange the way its structured, but similar in ways to what we're already talking about..