(Unpack) Mew 11 1.2 - Northfox/Hcc
(Unpack) Mew 11 1.2 - Northfox/Hcc
2 -> NorthFox/HCC
엔신
开始。
如果跳转到该区域并检查它,您将看到一个函数解密打包的数据。
........................... 省略...................................
004001FD C3 RETN
如果检查数据以解密中间数据并进一步向下查看报表,则最终将获得 RETN。将断点放在该区域并运
行。一段时间后,制动器发生,如果您一步一步地调整,OEP 就会出来。
然而,《分析守则》尚未实现。分析 -* 从模块菜单中删除分析允许正常的代码验证。
现在,您已经确认 OEP 是 45834,您需要查找 IAT。使用 Cntl + B 键使用 Serach 搜索二进制的
FF25。
并修复修复转储,您将能够正常解压缩。
MEW
MEW [8] is an executable tool which was designed to handle small files. It works on
32-bit workstations and uses the LZMA algorithm. It strips reloc tables, Delphi
resources, and unused resources. Even though it was designed to handle small
files, it can compress large files as well.
The last instruction in the MEW stub, as shown in Figure 17, is RETN. After this
instruction a jump to the OEP takes place. Set a break point on the RETN
instruction. When the break point is triggered, as shown in Figure 17, step once
and then dump the process to get the unpacked version of the file.
Figure 17. The last instructions for the MEW packer.
The logic used to locate the OEP for MEW is shown in Figure 18. The code ‘findop
eip, #C3#’ locates the RETN instruction in the debugged process packed with the
MEW packer. Once the RETN instruction is located, the debugger steps once and is
at the OEP. The OllyDump plug-in can be used to dump the process and we are left
with the unpacked version of the executable file.
Conclusion
Reducing the time it takes to perform malware analysis is very important. For static
analysis of malware it is important that the malware is unpacked. There are many
approaches to unpacking a piece of malware – for example, it can be executed in a
virtual environment and then we can capture a memory snapshot of the executing
malware. Once we get the snapshot, we can dump the unpacked malware directly
from memory. However, it is possible that not all of the code of the unpacked
malware will be in memory, so dumping a process from memory might not be an
effective unpacking method. Loading a packed malicious executable and executing
step by step instructions in a debugger is one of the best ways to locate the OEP
and execute the malware. In this article we have provided assembly instructions
for the most commonly used packers which can be used to quickly unpack
malware. We have also provided OllyScripts for the logic to manually unpack the
malware. This can further aid in reducing response time for malware analysis.
Bibliography
[1] http://www.farbrausch.de/~fg/kkrunchy/.
[2] http://pecompact.com/pecompact.php.
[3] http://www.bitsum.com/pec2av.htm.
[4] http://www.openrce.org/downloads/details/156/PECompact_v.2.40_ -
_OEP_finder.
[5] http://nspack.download-230-13103.programsbase.com/ .
[6] http://upx.sourceforge.net/.
[7] http://www.oberhumer.com/opensource/ucl/.
[8] http://www.softpedia.com/get/Programming/Packers-Crypters-
Protectors/MEW-SE.shtml.