Hero
December 4th, 2007, 05:45
Hi all
I'm working on an unknown packer.it seems simple,but i think i can't unpack it correctly.
because of rules,i can't name program that i work on it,but i give some specifications about it,perhaps you could recognize something similar:
1-if you use HARDCORE scan in PEid it says protection is Petite 1.4, normal scan defines nothing.
2-this is the only packer I seen it says nothing in olly about EP.I mean when you open up it in olly it seems like a normal application and goes without any message about EP.
2-the only packer I seen that starts with JMP instruction....
3-the only packer I seen that has a huge amount of obfuscated codes using JMP and PUSH addr,RET(another JMP way),that make tracing code almost impossible.
can you identify anything using this details?
In addition,I should say that I were be able to make a working semi-unpack from target.
from semi-unpack,I mean I were able to find something that I think is OEP,make a working application by dumping it on that OEP and rebuilding IAT with ImpRec, the the problem is that the main program body that that packers code is still connected in this semi-unpacked and i can't patch this semi-unpacked one because of that strange obfuscated code.
it really seems a 2-layer protection for me,that Perhaps Petite is only a small part of it,or i do unpacking incorrectly.
have anybody seen anything similar to this?
Regards
I'm working on an unknown packer.it seems simple,but i think i can't unpack it correctly.
because of rules,i can't name program that i work on it,but i give some specifications about it,perhaps you could recognize something similar:
1-if you use HARDCORE scan in PEid it says protection is Petite 1.4, normal scan defines nothing.
2-this is the only packer I seen it says nothing in olly about EP.I mean when you open up it in olly it seems like a normal application and goes without any message about EP.
2-the only packer I seen that starts with JMP instruction....

3-the only packer I seen that has a huge amount of obfuscated codes using JMP and PUSH addr,RET(another JMP way),that make tracing code almost impossible.
can you identify anything using this details?
In addition,I should say that I were be able to make a working semi-unpack from target.
from semi-unpack,I mean I were able to find something that I think is OEP,make a working application by dumping it on that OEP and rebuilding IAT with ImpRec, the the problem is that the main program body that that packers code is still connected in this semi-unpacked and i can't patch this semi-unpacked one because of that strange obfuscated code.
it really seems a 2-layer protection for me,that Perhaps Petite is only a small part of it,or i do unpacking incorrectly.
have anybody seen anything similar to this?
Regards