vect0r
October 28th, 2009, 18:06
Caught this in my honeypot and wanted to analyze it and C&C functionality. All packer detectors are picking it up as PeLock. I wanted to try unpack it manually and I'm having some difficulty.
Anti-debugging techniques are blocking my path obviously and SEHs are used. There also seems to be a number of hardware breakpoints that I can simply F9 past. I can get to a point where a number of commands are decrypted and a few layers in I see some C&C text. Tracing mostly involves F9ing until exception and passing the exception to Olly with SHIFT+F9.
However, I have been stumped by Olly throwing an unable to process exception error related to a ring0 SYSENTER call. Any assistance on manually unpacking or pointers related to this, would be much appreciated. From research, a ring0 debugger that can handle the call seems to be the way to go, but I would rather bypass this with Olly.
ATTENTION MALWARE ATTACHTED !!!!!
PASSWORD: infected
Anti-debugging techniques are blocking my path obviously and SEHs are used. There also seems to be a number of hardware breakpoints that I can simply F9 past. I can get to a point where a number of commands are decrypted and a few layers in I see some C&C text. Tracing mostly involves F9ing until exception and passing the exception to Olly with SHIFT+F9.
However, I have been stumped by Olly throwing an unable to process exception error related to a ring0 SYSENTER call. Any assistance on manually unpacking or pointers related to this, would be much appreciated. From research, a ring0 debugger that can handle the call seems to be the way to go, but I would rather bypass this with Olly.
ATTENTION MALWARE ATTACHTED !!!!!
PASSWORD: infected