تقييم الموضوع :
  • 0 أصوات - بمعدل 0
  • 1
  • 2
  • 3
  • 4
  • 5
Unpacking Malware
#1
مقالة تتحدث عن تجربة فك ضغط البرامج الضارة برمجيا اعتمادا على آلية المحاكاة.
Using Speakeasy Emulation Framework Programmatically to Unpack Malware

اقتباس:
 Andrew Davis recently announced the public release of his new Windows emulation framework named Speakeasy. While the introductory blog post focused on using Speakeasy as an automated malware sandbox of sorts, this entry will highlight another powerful use of the framework: automated malware unpacking.
I will demonstrate, with code examples, how Speakeasy can be used programmatically to
  1.  Bypass unsupported Windows APIs to continue emulation and unpacking
  2. Save virtual addresses of dynamically allocated code using API hooks
  3. Surgically direct execution to key areas of code using code hooks
  4. Dump an unpacked PE from emulator memory and fix its section headers
  5. Aid in reconstruction of import tables by querying Speakeasy for symbolic information

رابط المقالة:
https://www.fireeye.com/blog/threat-research/2020/12/using-speakeasy-emulation-framework-programmatically-to-unpack-malware.html
أعضاء أعجبوا بهذه المشاركة : vosiyons , Cyperior


التنقل السريع :


يقوم بقرائة الموضوع: بالاضافة الى ( 2 ) ضيف كريم