UnpacMe Automated Malware Unpacking - How We Built It and Why

แชร์
ฝัง
  • เผยแพร่เมื่อ 25 ม.ค. 2025

ความคิดเห็น • 49

  • @Ghostrunner55
    @Ghostrunner55 5 ปีที่แล้ว +3

    Took your class with your friend at DEFCON 27, you guys were the best ones there. Prepared, and predictably successful. no fuss, and very educational. It actually inspired me to go into malware analysis/ reverse engineering. Love your vids! Great guy you are

    • @OALABS
      @OALABS  5 ปีที่แล้ว +1

      Wow that is incredibly nice to hear, thank you! Feedback like this is so motivating. We are planning to be back again this year, with an updated course covering some unpacking techniques. Hope we see you there : )

    • @Ghostrunner55
      @Ghostrunner55 5 ปีที่แล้ว

      Definitely! Count me in!

    • @Ghostrunner55
      @Ghostrunner55 5 ปีที่แล้ว

      Do you have a discord? I've started watching your videos. Would be great to be a part of a group of others looking to get into Malware Analysis.

  • @majsfree
    @majsfree 4 ปีที่แล้ว +2

    Really nice history! The cycle controlled by that classifier deciding what is an intermediate or end state is a really nice idea. This part of the architecture (checking if the output is packed or not) sounds super challenging as well. Congratulations!

  • @karstenhahn1082
    @karstenhahn1082 4 ปีที่แล้ว +1

    I just finished watching it. Awesome, how much work and knowledge went into it. Great project!

    • @OALABS
      @OALABS  4 ปีที่แล้ว

      Thanks! Yeh this has been a big part of our lives for the past few years. So far it's been running really well though, we keep adding features and the user base is growing too... it's still early and I don't want to jinx it but I think it might end up being a real useful service going forward : )

  • @TheUmnez
    @TheUmnez 4 ปีที่แล้ว +6

    This channel singlehandedly makes learning reverse engineering 10s of times easier.

    • @OALABS
      @OALABS  4 ปีที่แล้ว

      Thank you : ))

  • @grayhalf1854
    @grayhalf1854 5 ปีที่แล้ว +1

    Excellent work on the tool!! Really useful primer here too :-)

  • @Cyberconman
    @Cyberconman 5 ปีที่แล้ว +1

    Thank you for you continued great work and sharing it with the community

  • @dasdboot
    @dasdboot 5 ปีที่แล้ว +2

    Awesome stuff guys! Threw at it a number of complicated cases of IcedID, REvil and GangCrab.. all handled well. Love the way you deliver, very structured and insightful. Tells me you guys really know your subject if even I can understand what you are talking about..;) Let me know if anything I can do to contribute to your project. Thanks again!!

  • @Matt0x00
    @Matt0x00 5 ปีที่แล้ว +4

    Thanks! This was a great history lesson.

  • @gaelc13
    @gaelc13 5 ปีที่แล้ว +1

    Good job, guys. Thanks for sharing your work.

  • @Hamled
    @Hamled 5 ปีที่แล้ว +1

    This sounds great! Really happy that y'all have been able to improve your design/architecture for the system over the years to get such a high success rate.
    Are there any plans to build plugins for, say IDA, to use the UnpacMe API?

    • @OALABS
      @OALABS  5 ปีที่แล้ว +1

      Yes for sure! There are already folks building tools around it, and I'm sure more to come in the future! github.com/larsborn/UnpacMeClient
      github.com/R3MRUM/unpacme

  • @SourceCodeDeleted
    @SourceCodeDeleted 5 ปีที่แล้ว +5

    Ok . This is the best thing that has happened in the malware community for a while.

  • @vallabhchole
    @vallabhchole 5 ปีที่แล้ว +1

    Great service sir!!
    also great video.

  • @karstenhahn1082
    @karstenhahn1082 4 ปีที่แล้ว +1

    Based on "The Art of Computer Virus Research and Defense" by Szor
    --> If the payload changes its form, it is metamorphic
    --> If the payload is encrypted using countless different stubs, is polymorphic
    --> If the payload is encrypted using a finite set of stubs, it is oligomorphic
    Szor applies it only to viruses and the way they replicate. But nowadays it is applied to the way malware is compiled or crypted.
    It's really confusing that literally everyone uses the terms differently XD

  • @TheSaravCh
    @TheSaravCh 4 ปีที่แล้ว +1

    Excellent video about unpacking. WinAppDbg works on 64 bit process and Win10 machine?

    • @OALABS
      @OALABS  4 ปีที่แล้ว

      With WinAppDbg we are frozen in time... Python 2.7 on Win7 x86 : )) But we have been porting a lot of things over to emulators so there are no longer any constraints around the OS. We were planning on talking about this at HITB this year but now with the travel restrictions I think we will just make a video...

  • @feifeilooper8312
    @feifeilooper8312 4 ปีที่แล้ว +1

    Thanks for this topic 😁,I’ve upload the two samples to unpacme website,their same packers as I know,but one of them was unpacked,anyway this is awesome topic.

  • @purpler3m910
    @purpler3m910 5 ปีที่แล้ว +1

    Thanks for the Awesome history lesson! Many things i did not know. I am a little bit smarter today!

  • @sulthansk6444
    @sulthansk6444 5 ปีที่แล้ว +1

    The perfect weapon
    Thanks for the video...

  • @nobackupkiwi
    @nobackupkiwi 5 ปีที่แล้ว +6

    Can you make a video on deobfuscation? :D

    • @OALABS
      @OALABS  5 ปีที่แล้ว +4

      Hey Francisco, I just replied to your comment on our other video. Same response here unfortunately... this is a hard topic that doesn't have a lot of generic solutions so making tutorials may not be the best way to cover it. However, this is an active research topic for us so we may have more on it in the future...

    • @nobackupkiwi
      @nobackupkiwi 5 ปีที่แล้ว +1

      ​@@OALABS Thank you for your answer :D I was hoping maybe an informative video explaining what type of obfuscation exists and what people tend to use to defeat it (symbolic execution, emulation, etc) will be interesting in my opinion and it will incentive/help people to code their own tools. Greetings.

  • @Glockenspiels
    @Glockenspiels 5 ปีที่แล้ว +1

    Instant subscribe ♥️

  • @jacobbello4368
    @jacobbello4368 5 ปีที่แล้ว +1

    Can you make a video on debugging malware that uses the Heaven's gate technique

    • @OALABS
      @OALABS  5 ปีที่แล้ว

      Yes, so we have actually been planning a video on this since our windbg tutorial! The second part of that tutorial is supposed to be Josh showing us how to use windbg to deal with some tricky heaven's gate implementation. We just haven't found the time but we will... eventually haha : )

  • @xMacTac
    @xMacTac 5 ปีที่แล้ว +1

    Interesting tool! Congrats :)

  • @Ahmed_Mtr
    @Ahmed_Mtr 5 ปีที่แล้ว +1

    Why you did not mention PINdemoniuom? Is it outdated?

    • @OALABS
      @OALABS  5 ปีที่แล้ว +1

      Nice suggestion! So I had honestly forgotten all about that project, it has been years since we worked with PIN and I think our initial PIN dumper was created before that project. So when it was released I don't think we looked at it very closely. Just checking out the github now it looks like it hasn't been updated in 4 years : (

  • @BinaryAdventure
    @BinaryAdventure 5 ปีที่แล้ว +1

    OHHHH YEEEESSSSSS!!!!!

    • @OALABS
      @OALABS  5 ปีที่แล้ว

      Haha thought you would dig it : )

  • @Zihad
    @Zihad 5 ปีที่แล้ว +1

    Frida is way better now right?

    • @OALABS
      @OALABS  5 ปีที่แล้ว

      Yes!! Frida now is not even comparable to what it was when we were working with it. It's so much more stable now. The issues we faced then would still be around now though... hard to debug crashes in production, and needs lots of external code to support "automating" it so not the best choice for what we are doing. However, a great tool for smaller jobs!

  • @nishanmaharjan4840
    @nishanmaharjan4840 5 ปีที่แล้ว +1

    Noice

  • @tomay3000
    @tomay3000 5 ปีที่แล้ว

    The upload of a 4.4 Mb PE32 file is tuck in the middle.

  • @andreling5020
    @andreling5020 4 ปีที่แล้ว

    can i be your student to learn plizz