Learn how to write code based signatures. Become proficient in detecting malware samples that have no plain text strings.
Jump to
37:06 for summary of tips.
Udemy course: https://www.udemy.com/course/windows-malware-analysis-for-hedgehogs-beginner-training/?couponCode=60EBAE52098A12D428B3
Coupon: 60EBAE52098A12D428B3
sample: https://www.unpac.me/results/3c111dab-5f80-45cb-83a8-76e3985d6c19?hash=892834734712fe5bc7a6614be6972de1be2d74ad424ef47b2c701046e4912426
coderex: https://github.com/intel471/coderex
yara: https://github.com/virustotal/yara/releases
unpac.me: https://www.unpac.me/
notepad++ syntax highlight: https://github.com/struppigel/NPP-Yara-Dark-UDL/tree/main
Buy me a coffee: https://ko-fi.com/struppigel
Follow me on Twitter: https://twitter.com/struppigel
00:00 Intro
00:47 PrivateLoader markup of target pattern
07:19 First signature version
17:13 Testing the signature on unpac.me
21:52 Correcting the signature
37:06 Tips summary
#yara #code #privateloader #malware #malwareanalysis #reverseengineering