Time
49 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:00
Hello and welcome back to the chorus. My name is David Prays and then the secondary video. I'm very excited to show you an example of a ransomware
00:07
typically known as the wanna Cry virus. So what I've done, basically in this virtual machine is I've installed an application called Blue Stacks.
00:16
Now, through this, what I've done is I've modified the actual wannacry virus.
00:21
You are free to go and and research and see how this could be done in an actual environment. What would happen is that
00:28
this would lower and actually take up your entire screen
00:31
for all *** dentals and purposes. This is just basically show you how such a ransomware attack would work. So worried about 98 99%. Ah, threshold. Once his loads, I'd like to go over and show you exactly how such a virus would work.
00:48
Now, in future labs, et cetera, I'm gonna be showing my own demo and how to create an actual, uh, ransomware. However, this is for ethical purpose is just to make a notation.
00:59
And in addition to that, what I will be doing is showcasing how to deflect this and how to make sure that even if you are hit with a ransomware attack, how to go ahead and go through
01:10
and remove this? So, assuming that this is my actual environment right now, this is I'm gonna go ahead.
01:15
And what I want to do is I see a Facebook. I can't see a star icon. Now, how would I unlock this
01:22
now? Here we go. Oops. Your files have been encrypted.
01:26
So once I'm hit with a ransomware attack, it's gonna give me a countdown so pennant will be raised on. This is just an example. I've modified a little bit of the content and your files will be lost on said ST
01:38
so you can send $300 worth of Bitcoin to the following address, et cetera. How do you pay? This is how people are hit with a ransomware attack.
01:48
So what I'd like to do in future videos is the go ahead and show how we can decrypt us because you do not need to pay Bitcoin. You didn't need to pay any kind of Cryptocurrency etcetera. And most people will actually have the understanding Well, with I go into safe mode, et cetera through windows
02:05
that I could actually get rid of this. That mayor may not be true. However, with that being said, I'm very excited to showcase my future videos and coarse content.
02:14
I'd like to thank you very much for this. Any questions? Comments, concerns, et cetera could always be sent out to me and again in future videos. We will be going over this in further detail, Thank you very much and have a great day.

Up Next

Malware Threats

This malware analysis training course covers basic information about things like viruses, worms, Trojans, ransomware, and more.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor
Instructor Profile Image
Dave Kupratis
Instructor