agnonymous
October 18th, 2004, 12:11
Hi all,
This is my first post but i've been a reader of this forum for some time now. I'm grateful to this forum because just one year ago I did not know anything about unpacking, now I think it's one of my hobbies ...
we, manual unpackers have a nice advantage: the packer-cryptor programmer is fighting his natural tendency for order and structure (as a computer programmer), so the most complex protections still have order in them, and that is also the weak point we must look for
Anyway...my first post is about activema**.
I've been fighting this beast for a few days now but i can tell you there's nothing impressive about it. I've had a few successful unpackings so far.
basically:
- find OEP
- dump
- fix imports
the packer replaces some of the calls call ds:[API] (6 bytes) with a nop; call proc (the call proc takes only 5 bytes, hence the nop)
so patching the dump is needed. Why I did is opening the partly fixed dump in disassembler, find out all the suspicious calls (nop followed by a call), see what API they eventually call and patch them back to a call ds:[API]
I believe IDA pro + a IDC script would be a very nice solution
At the moment I'm working on static unpacking to avoid api tracing which is too time consuming for me. If someone is working on the same thing I would be interested to share ideas.
manual unpacker
This is my first post but i've been a reader of this forum for some time now. I'm grateful to this forum because just one year ago I did not know anything about unpacking, now I think it's one of my hobbies ...
we, manual unpackers have a nice advantage: the packer-cryptor programmer is fighting his natural tendency for order and structure (as a computer programmer), so the most complex protections still have order in them, and that is also the weak point we must look for

Anyway...my first post is about activema**.
I've been fighting this beast for a few days now but i can tell you there's nothing impressive about it. I've had a few successful unpackings so far.
basically:
- find OEP
- dump
- fix imports
the packer replaces some of the calls call ds:[API] (6 bytes) with a nop; call proc (the call proc takes only 5 bytes, hence the nop)
so patching the dump is needed. Why I did is opening the partly fixed dump in disassembler, find out all the suspicious calls (nop followed by a call), see what API they eventually call and patch them back to a call ds:[API]
I believe IDA pro + a IDC script would be a very nice solution
At the moment I'm working on static unpacking to avoid api tracing which is too time consuming for me. If someone is working on the same thing I would be interested to share ideas.
manual unpacker
