Back to Browse

How To Reverse Engineer RC4 Crypto For Malware Analysis

5.0K views
Jan 18, 2021
59:37

View our malware analysis training: https://AGDCservices.com/training/ Follow me on Twitter for RE tips and resources: https://twitter.com/AGDCservices View our malware analysis products to aid in your RE efforts (Ghidra / python scripts, tools, and individual analysis results) https://github.com/agdcservices Get resources to help with learning malware analysis https://agdcservices.com/blog/resources-for-learning-malware-analysis/ In this video, we will learn how to identify, extract the cryptographic key, and dynamically verify RC4 cryptography commonly used in malware. We’ll cover the theory and then walk through several examples to demonstrate the concepts. RC4 crypto is one of the most widely used algorithms malware uses to obfuscate it’s high valued data like url strings and other IOCs. Learning to deal with this capability is a key requirement to advance your malware analysis skills. Download the malware samples at https://malshare.com to review in your own analysis lab: 1. Example 1: 221cbb3df05e346187af129aa128af44c002945955b2f98f1a77b911b636e4db 2. Example 2: 6652588e445d7dca9f68c260d4b471ebabfcd044084837ccd3d0eeb53eb45288 3. Example 3: 58e923ff158fb5aecd293b7a0e0d305296110b83c6e270786edcc4fea1c8404c #ReverseEngineering #MalwareAnalysis #RC4 #Crypto #Encryption #Decryption #SRE #RE

Download

0 formats

No download links available.

How To Reverse Engineer RC4 Crypto For Malware Analysis | NatokHD