Anti Reverse Engineering
Anti Reverse Engineering
Anti Reverse Engineering
Nicolas Brulez
Virus Researcher
Agenda
Introduction Crimeware and Anti Reverse Engineering Techniques Anti Debugging Anti Virtual Machine Custom Packers / Protectors Detecting and Removing New Packers File Format Analysis Unpacking Questions
Introduction
Anti Reverse Engineering Techniques are becoming very common in CrimeWare. Phishing Trojans use those techniques as well as custom Packers. Those trojans are updated quite often with new anti emulation techniques Bots are using custom packers/protectors as well.
11
12
// Nicolas Brulez SEH counter var counter eoe lbl1 run lbl1: cob coe esto add counter, 1 log counter jmp lbl1
14
15
16
17
18
20
Unpacking
Unpacking knowledge is very handy for Reverse Engineers. Most malwares are packed to hide their real code from Disassemblers. There are a lot of different PE packers and PE protectors out there, and many have no public unpackers. Fortunately, most packers (and Protectors :P) are easy to remove.
21
Dump the process to disk Using tools such as LordPE or Imprec Process dumpers.
22
23
Questions?
English is not my native language, please ask slowly ;-) Thanks If you are interrested into Anti Reverse Engineering Techniques : http://honeynet.org/scans/scan33/ A challenge i made 2 years ago: My complete paper with all the submissions to see how you can attack armored binaries [email protected] http://WebsenseSecurityLabs.com http://www.reverse-engineer.org
25