YoVDO

Interesting Malware - No, I’m Not Kidding

Offered By: Cooper via YouTube

Tags

Hack.lu Courses Cybersecurity Courses Malware Analysis Courses

Course Description

Overview

Explore the intricacies of an unusual malware family dubbed "CheshireCat" in this 45-minute conference talk from Hack.lu 2016. Delve into the implementation traits, stealth tactics, and unique functionalities of this long-running malware operation, active since 2002. Examine the retro coding style and functional obfuscation techniques that make CheshireCat stand out. Learn about its support for outdated systems, dial-up connections, and peculiar executable header checks. Discover how this dedicated malware has managed to stay under the radar for over a decade, potentially targeting specialized networks. Follow the presenter's analysis of different implant versions, browser injection methods, keylogging techniques, and file system enumeration. Gain insights into the malware's structure, function arrays, and anti-detection mechanisms. Compare CheshireCat to other malware families and draw conclusions about its significance in the cybersecurity landscape.

Syllabus

Introduction
Implant 2002
Implant 20072011
Binary structure
Browser injection
Keylogging
File System Enumeration
Function arrays
Lewis Carroll quote
Hiding from antivirus
Recap
Sketch
Comparison
Conclusion


Taught by

Cooper

Related Courses

Modern Pentest Tricks for Faster, Wider, Greater Engagements
Cooper via YouTube
Take Your Path Normalization Off and Pop 0days Out
Cooper via YouTube
Finding the Best TI Provider for a Specific Purpose
Cooper via YouTube
Make ARM Shellcode Great Again
Cooper via YouTube
Digital Safety for Politically Vulnerable Organizations
Cooper via YouTube