Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile
Shrutirupa Banerjiee (She/Her)

@freak_crypt

Malware Researcher | Reverse Engineer | Ex GoogleDevExpert | Speaker

ID: 1038018544082907136

linkhttps://youtube.com/@CryptoWare calendar_today07-09-2018 10:58:01

4,4K Tweet

1,1K Followers

301 Following

Reverse Engineering and More (@re_and_more) 's Twitter Profile Photo

RE tip of the day: Malware can detect VM by simply checking hardware details (model, manufacturer, etc) on the current machine, for example, using WMI queries: * SELECT * FROM Win32_ComputerSystem * SELECT * FROM Win32_BIOS #infosec #cybersecurity #malware #reverseengineering

Reverse Engineering and More (@re_and_more) 's Twitter Profile Photo

RE tip of the day: There are multiple artifacts revealing the presence of the VM to malware on a guest system, mainly associated with auxiliary tools: * Files * Processes and services * Registry keys * Devices and named pipes #infosec #cybersecurity #malware #reverseengineering

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

๐Ÿ” New Video Alert! ๐Ÿ” We're analyzing an XLS sample statically with Oletools. This downloader seems to aim for more files, but even without the next file, this analysis is perfect for beginners. Watch now and start your malware analysis journey! ๐Ÿš€ Link: youtube.com/watch?v=pM78cMโ€ฆ

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

๐Ÿšจ New Video Alert! Dive into #MalwareAnalysis with me as we explore bypassing the IsDebuggerPresent APIโ€”an essential technique for evading debuggers. My channel, CryptoW@re, is focused on beginner-level content. Link-youtube.com/watch?v=DpzL2fโ€ฆ #malware #debugging

J1NX (@j1nnx26) 's Twitter Profile Photo

Hi everyone, Iโ€™m seeking new career opportunities and would greatly appreciate your support. Iโ€™m ready to embrace new challenges and continue my professional growth. If you know of any exciting opportunities or are open to a discussion, please feel free to DM me or comment below.

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

๐Ÿšจ New Video Alert! ๐Ÿšจ Our latest video analyzes an HTA file from an XLS sample. This sample seems to be a loader with embedded files. Basic analysis done, more to come! ๐Ÿ” Disclaimer: Use a sandboxed environment for analyzing malware. ๐Ÿ‘‰ Watch now: youtu.be/ThMR1DQHKRQ

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

๐Ÿ” Deobfuscating another sample in my latest video! Looked tough, but with the right tools, it was easy. ๐ŸŽฅ More complex obfuscation coming soon, perfect for beginners! ๐Ÿ›ก๏ธ Pro tip: Always analyze in a sandbox. Like, share, and subscribe! ๐Ÿš€ youtube.com/watch?v=YPQuruโ€ฆ #malware

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

๐Ÿšจ New Video Alert on my channel CryptoW@re! ๐Ÿšจ Here we're diving into Locky ransomware using x32dbg. Weโ€™ll uncover some subtle tricks it performs before encryption kicks in. This is Part 1 of our analysis This approach is perfect for beginners. Link:- youtu.be/XhYMpn8t8GA

GDG Coimbatore (@gdgcoimbatore) 's Twitter Profile Photo

๐Ÿšจ Don't miss Shrutirupa Shrutirupa Banerjiee (She/Her), Google Developer Expert, at #DevFest2024 #Coimbatore! She'll be exposing the dark side of #AI in her talk "AI-Powered Malware: The Evolving Threat Landscape." Learn how to protect yourself from the rising threat of AI-driven malware.

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

New Video Alert! Learn the basics of PE file structure in my latest video, tailored for complete beginners! ๐Ÿš€ Perfect for anyone starting their journey in malware analysis or reverse engineering. Always analyze in a sandboxed environment. Watch here: youtube.com/watch?v=CcZ966โ€ฆ

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

๐Ÿš€ New YouTube Video Alert! Learn reverse engineering with a simple crackme challenge, perfect for beginners with minimal assembly knowledge. ๐ŸŽฅ Watch here: youtu.be/W4flqAvrWCY โš ๏ธ Always use a sandbox! #malware #reverseengineering #CyberSecurity

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

๐Ÿšจ New Video Alert! Tackling a reverse engineering challenge from Crackmes.one ๐Ÿงฉ with: ๐Ÿ” Ghidra + x32dbg ๐Ÿ› ๏ธ Beginner-friendly explanations ๐Ÿ’ก Code walkthrough for better understanding ๐Ÿ“บ Watch here: youtu.be/1jKP-c3_SSg?siโ€ฆ

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

New videos alert!! ๐Ÿ” Locky Ransomware Analysis - Part 2 โžก๏ธ Why couldn't Locky encrypt? Watch: youtube.com/watch?v=Bla2OTโ€ฆ] ๐Ÿ” WannaCry - Did it run after Locky? โžก๏ธ youtube.com/watch?v=zrnCBpโ€ฆ Upcoming: Debugging WannaCry's encryption process! Stay tuned. #MalwareAnalysis

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

New Video Alert!!! In this video, I debug & analyze WannaCry inside a virtualized environment. If you're new to malware analysis, this is a perfect starting point! This is just Part 1โ€”full analysis coming soon! ๐Ÿ“บ Watch now & subscribe: youtube.com/watch?v=yw8_Cqโ€ฆ #malwareanalysis

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

๐Ÿšจ New RE video! ๐ŸŽฏ Solving a #Crackmes.one challenge ๐Ÿง  Bypass anti-debug ๐Ÿ” Find username & password ๐Ÿ”ง Tool: #x32dbg ๐ŸŽฅ Beginner-friendly & hands-on ๐Ÿ“บ Watch here: youtu.be/vmB5SB39UbQ #ReverseEngineering #MalwareAnalysis #CyberSecurity #InfoSec #RE4Beginners

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

๐ŸŽฏ Day 1 of the Alt-Day RE Challenge is LIVE! Solving RE challenges from very easy to slightly tricky, perfect for beginners. Using Ghidra, breaking logic, learning as we go. ๐Ÿ” ๐Ÿ“ฝ๏ธ Watch & solve with me: youtube.com/watch?v=p5J5BVโ€ฆ New video every alternate day.