----- Original Message ----- From: "Andrei Saygo" <[EMAIL PROTECTED]>
To: <[email protected]>
Sent: Friday, June 30, 2006 6:30 AM
Subject: Re: PECompact2


On Friday 23 June 2006 21:05, [EMAIL PROTECTED] wrote:
Greetings,

I recently came across a suspicious binary (.SCR) file in a
compromised system. As I started to analyse it by running a
'strings' against it I noticed there was very little readable text
in it, but the first line caught my attention: PECompact2.

I did some research and it seems this indicates the binary is
somehow compressed/obfuscated by using some sort of PE compression
tool (probably http://www.bitsum.com/pec2.asp).

Now I would like to unpack the executable to carry on with the
analysis. From what I could understand this would only be possible
by running it in a test win32 system, probably using a dissasembly
tool, since it only "unpacks" itself when being executed. Is that
correct? Would there be some other way of doing so, perhaps using
some sort of decompression tool? I was not able to find any so far.



PECompact is rather trivial to manually unpack...

The first instruction of the packer is a MOV EAX, [addr].
Go to the address  at [addr] and scroll down until you reach JMP EAX.
Put a Breakpoint on the JMP EAX, run the software and that will break at the jump to OEP...

RaMatkal

Reply via email to