LCF-AT Posted July 7, 2007 Posted July 7, 2007 I think it looks very wrong.I dont know exactly what you are trying to unpack.Which protection?You can download a very good arma tool by MOID that can analyzewith which you have to do it.http://anonym.to/?http://www.tuts4you.com/...amp;hl=intrudergreetz
MadOldschool Posted July 7, 2007 Posted July 7, 2007 I think it looks very wrong.I dont know exactly what you are trying to unpack.Which protection?You can download a very good arma tool by MOID that can analyzewith which you have to do it.http://anonym.to/?http://www.tuts4you.com/...amp;hl=intrudergreetzThx....this is what it said:Armadillo version: 4.66Build date: 2007-03-12OEP VA: 004E7E22Raw options: 00E3AA52-=Protection=-Strategic Code Splicing enabled.Import Elimination enabled.Debug Blocker enabled.Nanomites enabled.
LCF-AT Posted July 7, 2007 Posted July 7, 2007 Hi MadOldschool,are you trying to unpack a UnpackMe or a app?I could see a better overview if you say the name of it.Only for the unpack part,so i can help you better.
MadOldschool Posted July 8, 2007 Posted July 8, 2007 Hi MadOldschool,are you trying to unpack a UnpackMe or a app?I could see a better overview if you say the name of it.Only for the unpack part,so i can help you better.I'm trying to unpack an apphttp://stream.ifolder.ru/2600038press next-->enter the capcha code-->press nextthx in advance----------------------------------------------------------------Just as a brief overview of what I'm trying to do:1. get past the debug blocker2. Find 2 IATs and RETN on them3. Get to the OEP4. Unpack with ImpRec to defeat code splicingCorrect?
LCF-AT Posted July 8, 2007 Posted July 8, 2007 Hello MadOldschool, i have unpacked now this app.I explain you now a little bit but not all how to unpack all by hand. 1.DebugBlocker Set BP on OpenMutexA/Second Break (back to usercode) 00951E67 85C0 TEST EAX,EAX00951E69 0F85 7A020000 JNZ HoldemIn.009520E9 <----Change to JE00951E6F 6A 01 PUSH 1 2.Set BP on GetModuleHandleA for MagicJump/I have you explain before. 013F6855 FF15 E4714101 CALL DWORD PTR DS:[14171E4] ; kernel32.LoadLibraryA013F685B 8B0D AC554201 MOV ECX,DWORD PTR DS:[14255AC]013F6861 89040E MOV DWORD PTR DS:[ESI+ECX],EAX ; kernel32.77E40000013F6864 A1 AC554201 MOV EAX,DWORD PTR DS:[14255AC]013F6869 391C06 CMP DWORD PTR DS:[ESI+EAX],EBX013F686C 0F84 2F010000 JE 013F69A1 <----Magic Jump to JMP 3.Set BP on CreateThread on the ret 18 of this API After the break trace til you reach the Call ECX and step in. 004EC9A2 E8 0F040000 CALL HoldemIn.004ECDB6 <----OEP004EC9A7 ^ E9 35FDFFFF JMP HoldemIn.004EC6E1004EC9AC 68 F8C54E00 PUSH HoldemIn.004EC5F8004EC9B1 64:FF35 00000000 PUSH DWORD PTR FS:[0]004EC9B8 8B4424 10 MOV EAX,DWORD PTR SS:[ESP+10] Now just look into a Call and search a Iat pointer or Call. 004ECDF1 8B75 FC MOV ESI,DWORD PTR SS:[EBP-4]004ECDF4 3375 F8 XOR ESI,DWORD PTR SS:[EBP-8]004ECDF7 FF15 34176B01 CALL DWORD PTR DS:[16B1734] ;kernel32.GetCurrentProcessId Follow a Iat Call in Dump/memory and find the start of the Iat 016B105C 00080102016B1060 7820921B MFC80.7820921B <---IAT start016B1064 781FE238 MFC80.781FE238016B1068 7821C352 MFC80.7821C352016B206C 00000000 <---IAT end016B206C - 016B1060 = 100C (size) Now find the Code Splicing.Scroll above to the start in Olly and you will see this.(always other address) 0040105E CC INT30040105F CC INT300401060 83EC 14 SUB ESP,1400401063 - E9 98EF7F01 JMP 01C00000 <--Jump into Code splicing section00401068 66:87FE XCHG SI,DI0040106B 66:87C9 XCHG CX,CX0040106E 57 PUSH EDI ; HoldemIn.009901300040106F 5F POP EDI ; 01410ECC00401070 66:87FE XCHG SI,DI00401073 FF15 D4196B01 CALL DWORD PTR DS:[16B19D4] ; OLEAUT32.VariantInit00401079 - E9 9DEF7F01 JMP 01C0001B <--Jump into Code splicing section0040107E 51 PUSH ECX ; HoldemIn.004EC9A20040107F 66:96 XCHG AX,SI Now you can look into the Memory Map to find this section 01C00000 (Important-the section is dynamic and is changing)Now this time the section is 01C00000 size 20000.Look down and Note the R E by Access) Now you can fix by yourself or you use a tool called Arminline 0.96 to Repair all. I have used this tool in this case.I dont explain now how to do it manual to fix the protections manual. I explain you how to use this tool. You should be able to solve some tutorials to read around this protection manually. The Nano_Fix Dump is 8.6 MB big and is working fine. greetz
MadOldschool Posted July 9, 2007 Posted July 9, 2007 (edited) WOW LCF...I'm speachless. :wub: Thank You. Edited July 9, 2007 by MadOldschool
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now