tag:blogger.com,1999:blog-8200574116175766775.post7037842853423852885..comments2022-04-24T12:57:50.961-07:00Comments on MALware FORensics SECurity: Analyzing Red Kit Exploit Kit made easymalforsechttp://www.blogger.com/profile/15339003536364790652noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-8200574116175766775.post-35020317259973748252013-05-09T13:36:10.548-07:002013-05-09T13:36:10.548-07:00Since I used Java in the user agent I got an encry...Since I used Java in the user agent I got an encrypted file. It's encrypted with AES and the KEY and IV is in the JAR file.<br /><br />Since the info is published elsewhere I decided to publish as well: http://malforsec.blogspot.com/2013/05/redkit-payload-decryption.htmlmalforsechttps://www.blogger.com/profile/15339003536364790652noreply@blogger.comtag:blogger.com,1999:blog-8200574116175766775.post-73569816830039067202013-05-08T07:47:33.963-07:002013-05-08T07:47:33.963-07:00After you remembered you had used "Java"...After you remembered you had used "Java" as user agent and that you would get encrypted .exe files from Red Kit - what did you have to do to decrypt the .exe?Anonymousnoreply@blogger.com