In this video, we look at "Whisper Gate" - an infamous destructive malware targeting Ukrainian organizations, that has been discovered and described by Microsoft.
We will deep dive into malware code and find out how it works, what it does, and if data is destroyed beyond recovery.
Malware sample:
MD5: 5d5c99a08a7d927346ca2dafa7973fc1
SHA-1: 189166d382c73c242ba45889d57980548d4ba37e
SHA-256: a196c6b8ffcb97ffb276d04f354696e2391311db3841ae16c8c9f56f36a38e92
Malware Baazar:
[ Ссылка ]
VirusTotal:
[ Ссылка ]
Video parts:
00:00 Intro
01:04 Triage
03:58 Static analysis
09:42 MBR code
10:19 Renaming
23:13 Dynamic analysis
29:32 Recovery
31:42 Outro
Follow me on social media:
My blog: [ Ссылка ]
My Twitter: [ Ссылка ]
My GitHub: [ Ссылка ]
#malwareanalysis #malware #cybersecurity #whispergate #technology
![](https://i.ytimg.com/vi/Ek3URIaC5O8/mqdefault.jpg)