الفريق العربي للهندسة العكسية
Unpacking Malware - نسخة قابلة للطباعة

+- الفريق العربي للهندسة العكسية (https://www.at4re.net/f)
+-- قسم : منتديات الهندسة العكسية - Reverse Engineering Forums (https://www.at4re.net/f/forum-4.html)
+--- قسم : مختبر الفايروسات - Virus & Malware Labs (https://www.at4re.net/f/forum-30.html)
+--- الموضوع : Unpacking Malware (/thread-2232.html)



Unpacking Malware - overlap - 02-12-2020

مقالة تتحدث عن تجربة فك ضغط البرامج الضارة برمجيا اعتمادا على آلية المحاكاة.
Using Speakeasy Emulation Framework Programmatically to Unpack Malware

اقتباس:
 Andrew Davis recently announced the public release of his new Windows emulation framework named Speakeasy. While the introductory blog post focused on using Speakeasy as an automated malware sandbox of sorts, this entry will highlight another powerful use of the framework: automated malware unpacking.
I will demonstrate, with code examples, how Speakeasy can be used programmatically to
  1.  Bypass unsupported Windows APIs to continue emulation and unpacking
  2. Save virtual addresses of dynamically allocated code using API hooks
  3. Surgically direct execution to key areas of code using code hooks
  4. Dump an unpacked PE from emulator memory and fix its section headers
  5. Aid in reconstruction of import tables by querying Speakeasy for symbolic information

رابط المقالة:
https://www.fireeye.com/blog/threat-research/2020/12/using-speakeasy-emulation-framework-programmatically-to-unpack-malware.html