live_dont_exist
November 10th, 2011, 00:54
Hi All,
I was trying to reverse an executable giving to me by someone for my own learning purposes. I am currently stuck. Here is the problem and what I have done:
--- Olly detects an entry point
--- It JMP's to a location after some 4 instructions, at that location there is another JMP
--- After this it just goes into an endless loop of 4 instructions inside which control remains; I don't think that loop ever exits
How does one debug this?
My first instinct was to think it was packed and I tried using PEiD to detect a packer. PEID failed though saying it could not read process memory. After Googling I found a few people had recommended RDG Packer detector. I tried that and it gave me 2 results for its 2 modes - WL - Cryptor 1.0 and Obsidium 1.2.
I also used the HideDebugger plugin and checked all its options to hide the debugger from the process, but that doesn't make sense as there do not seem to be any calls to these functions. Unless there is something before Entry Point.
On googling Obsidium, I found this was a license protector software so there may be a chance it was used here. But now, how do I proceed? Is writing an unpacking routine for Obsidium the only way forward? In this case I am stuck as I have no clue [not skilled enough] on how to even start thinking.
Is this EXE packed for sure? How does 1 think in this situation?
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DANGER ---- MALWARE
I have attached a few screenshots to show you what exactly I have done so far. It also contains the exact malware sample if you need it.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Thanks
Arvind
I was trying to reverse an executable giving to me by someone for my own learning purposes. I am currently stuck. Here is the problem and what I have done:
--- Olly detects an entry point
--- It JMP's to a location after some 4 instructions, at that location there is another JMP
--- After this it just goes into an endless loop of 4 instructions inside which control remains; I don't think that loop ever exits
How does one debug this?
My first instinct was to think it was packed and I tried using PEiD to detect a packer. PEID failed though saying it could not read process memory. After Googling I found a few people had recommended RDG Packer detector. I tried that and it gave me 2 results for its 2 modes - WL - Cryptor 1.0 and Obsidium 1.2.
I also used the HideDebugger plugin and checked all its options to hide the debugger from the process, but that doesn't make sense as there do not seem to be any calls to these functions. Unless there is something before Entry Point.
On googling Obsidium, I found this was a license protector software so there may be a chance it was used here. But now, how do I proceed? Is writing an unpacking routine for Obsidium the only way forward? In this case I am stuck as I have no clue [not skilled enough] on how to even start thinking.
Is this EXE packed for sure? How does 1 think in this situation?
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DANGER ---- MALWARE
I have attached a few screenshots to show you what exactly I have done so far. It also contains the exact malware sample if you need it.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Thanks
Arvind