如何分析Google广告中的恶意软件

作者:FancyPig | 发布时间: | 更新时间:

相关阅读

data-postsbox="{"id":31221,"title":"Google搜索被黑 | 苹果黑客工具疑似泄露 | T-mobile发生数据泄露","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2023/01/20230126053135812.png","cover_video":"","views":1341,"comment_count":7,"category":"knowledge","is_forum_post":false}">{"id":31221,"title":"Google搜索被黑 | 苹果黑客工具疑似泄露 | T-mobile发生数据泄露","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2023/01/20230126053135812.png","cover_video":"","views":1341,"comment_count":7,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":25927,"title":"如何判断电脑被入侵?如何通过Volatility分析内存并进行取证?","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/11/20221105071630723.png","cover_video":"","views":2445,"comment_count":8,"category":"knowledge","is_forum_post":false}">{"id":25927,"title":"如何判断电脑被入侵?如何通过Volatility分析内存并进行取证?","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/11/20221105071630723.png","cover_video":"","views":2445,"comment_count":8,"category":"knowledge","is_forum_post":false}

视频讲解

在上期视频中,我们分享了Google广告中存在恶意链接,导致用户访问了仿冒的官网,最终下载了恶意软件,这种手段依旧存在。本期视频我们使用二进制编辑器对其分析,可以发现部分恶意软件使用填充垃圾数据从而扩大了空间,从而绕过了杀毒软件的检测。我们通过删除垃圾数据,然后上传virustotal进行检测,最终发现该软件存在木马病毒……

相关二进制编辑器

data-postsbox="{"id":6749,"title":"010Editor最新12.0.1激活版下载 世界上最好的十六进制编辑器","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":1287,"comment_count":3,"category":"software","is_forum_post":false}">{"id":6749,"title":"010Editor最新12.0.1激活版下载 世界上最好的十六进制编辑器","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":1287,"comment_count":3,"category":"software","is_forum_post":false}

或者也可以使用视频中的二进制编辑器HxD20

标签:post, 软件, 编辑器