Back to Browse

Unpacking Malware that uses AutoIt

3.9K views
Mar 4, 2020
8:57

In this video we'll take a look at ways to tell if a malware author has used AutoIt as a form of packing, along with how to "unpack" those samples. We'll perform brief behavioral analysis in Any.run, then analyze the sample statically with PE Studio before unpacking. By the end of this video you will have better insight into detecting and unpacking AutoIt scripts. Cybersecurity, reverse engineering, malware analysis and ethical hacking content! πŸŽ“ Courses on Pluralsight πŸ‘‰πŸ» https://www.pluralsight.com/authors/josh-stroschein 🌢️ YouTube πŸ‘‰πŸ» Like, Comment & Subscribe! πŸ™πŸ» Support my work πŸ‘‰πŸ» https://patreon.com/JoshStroschein 🌎 Follow me πŸ‘‰πŸ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/ βš™οΈ Tinker with me on Github πŸ‘‰πŸ» https://github.com/jstrosch The sample that we'll be looking at can be found on Any.Run at: https://app.any.run/tasks/a5992e7b-d975-4a81-9952-8d98ec530c38/.

Download

0 formats

No download links available.

Unpacking Malware that uses AutoIt | NatokHD