My half assed answers, thinking out loud here, not very constructed.
Fake stubs are not really new.. you can also abuse the fact that signatures have wild chars (??) to redirect the code flow, yet matching the signatures.
Quote:
[Originally Posted by deroko]
you really think that some skilled vx writer will use armadillo to protect his own code? nah
HL malware writers are the ones who are/will use armadillo,aspr,svkp, etc. to hide their easily detected code. |
It does not take a skilled guy to copy/paste a few bytes from my old asm stub in Armadillo, and redirect code flow to the other packer Entry Point.
I think the benefit of using Arma (or other commercial protectors), is that even if it could be emulated by AV engines (not a lot of engines can do it from what i have seen), it takes too much times anyway.
Each packed file has a different encoded representation, so if you pack the same file, every time it is different. (to some extent anyway).
I suppose they just want to make it harder to detect, not because it is actually hard, but because a tons of legitimate applications use those commercial protectors, and thus, false positives are possible..
When i was working for Armadillo, we have had a lot of problems with this, false positives from AV vendors detecting ANY armadilled application as a virus.
Obviously, a skilled guy would not bother using a commercial protector, as it bloat the file, and has been studied by everyone and his brother.
If would be a lot more effective to write your own stuff to protect your files against detection (pre signature) and analyse..
But then, when you make your own custom stuff, it is not a problem for AV people to detect it. (i am not talking about infectors here).
Now regarding the live unpacking, you won't find AV running applications on the real cpu, because it could (and would) be abused. The idea of limited user is interesting, but they would still not take the risk.
It reminds me some very old stuff, back in DOS days, some scanner were emulating applications, and there were viruses that would take advantage of that, to actually infect the whole computer.. and the computer was clean before the scan
An example:
http://www.chez.com/unkm/DATAS/TUTORS/NUKE/Rstut010.txt
Naides:
They need to unpack the application first, because making signatures on packed files is not reliable, and prone to false positives. Also a lot of packers will make the packed data different every time the application is packed..
And, why making a signature for every packed variants (ie a lot of sigs), when you can make only one (or few) that would detect it, once the file has been unpacked, no matter what packer has been used (i am talking about packers, and not protectors here. as they were proved to thwart most AV anyway).
My 2 cents.
PS:
Deroko: nice unpacking work by the way, i like what you do. I started looking at this HyperUnpackMe2, i have the whole VM almost commented, but i am lacking free time those days..
Disavowed: heya
