Jump to content
Tuts 4 You

NiggaEX


Recommended Posts

Posted

NiggaEX


Unpack and provide a overview of how you did it and what tools were used.


 

  • Haha 1
Posted

you did not change anything, whats cool about it ? the protector Name?

  • 1 month later...
Posted
On 2/28/2022 at 4:20 PM, Mr-Toms said:

you did not change anything, whats cool about it ? the protector Name?

NiggaEX is a ConfuserEx modification with the following changes;

Renamed (types, methods, fields, resources)

String enc

Control flow

  • 2 weeks later...
Posted (edited)

 

Control flow is alredy includet in the normal confuserEx ergo not new function same for string enc is ther to alredy same for resource and the orther stuff you mention that you attet it that stuff is alredy includet in each cunfuserEx.

HM what should i say xd :

of curse its not komplett devizert but the standart tools work so far

Spoiler

image.png.ea0d9a3df875e9caf4d8ae81b738d351.png

Edited by Underground
  • Like 1
Posted (edited)

you need to know the right order to unpack this 

this is the order i do after decompress and remove anti tamper

and the unpacked file is not de4doted yet , and the entrypoint still missing 

image.png.7e2dee21d1c5e7d8ccaf3f0c133aa064.png

NiggaEx_Decompressed_NoCfex.exe

Edited by Mr-Toms
DarkShadow
Posted
On 4/30/2022 at 11:33 AM, Accede said:

 

Control flow is alredy includet in the normal confuserEx ergo not new function same for string enc is ther to alredy same for resource and the orther stuff you mention that you attet it that stuff is alredy includet in each cunfuserEx.

HM what should i say xd :

of curse its not komplett devizert but the standart tools work so far

  Reveal hidden contents

image.png.ea0d9a3df875e9caf4d8ae81b738d351.png

It's not the same string encryption & not same renamer

Posted

i've solved this but i dont know why moderator didnt approved my comments

  • 2 weeks later...
DarkShadow
Posted
On 5/11/2022 at 5:46 AM, Mr-Toms said:

i've solved this but i dont know why moderator didnt approved my comments

Check the rules 

  • 5 months later...
Posted (edited)

image.png.17e461fd15c0ff17bec9df5ba6a49956.png

There's not much to describe about the unpacking steps, I just dumped it and made a de-obfuscator for it.

Unpacked.exe

Edited by SychicBoy
  • Like 2
Posted

Well, what did you use to dump it and can you show the deobfuscator? ;)

  • Like 1
Posted (edited)
On 11/7/2022 at 10:14 PM, deepzero said:

Well, what did you use to dump it and can you show the deobfuscator? ;)

Steps:
1-Execute the target file
2-Open "ExtremeDumper-x86" and select AntiDump mode from Options>DumpType. On processes list right click on the target process and select View Modules option and find the <<EmptyName>> from the modules list and dump it.
3-Open the dumped file in dnSpy find the entrypoint then right click on the assembly module and set the entrypoint of the module then save the changes.
4-Use "ConfuserEx-Unpacker" to get rid of cflow, call proxy, etc...
5-Use "Size and Mathematical Fixer" to get rid of sizeof's and mathematical obfuscation.
6-Use "de4dot" to rename symbols.
7-Now you should do the rest yourself: (clean if cflow, fix string/int proxy, decrypt strings).

Tools.zip

Edited by SychicBoy
  • Like 4
  • Thanks 1
Hadits follower
Posted (edited)
filepath -c corruptFile 
filepath -c vv
filepath -c dd

-c corruptFile will make nop cflow but file will not run , because i am new;

-c vv will show u the process

-c dd [manual :: Class removing process disable ]

use only -vv will de4dot args as usual 

NSCL restored fixed 

 

or simple just drop this target 

2015Unpacker.zip

2015UnpackerM.zip

Edited by Only_Islams_The_Rifht_Path
fixed bugs and remove chain M

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...