What is the primary purpose of packing for malware authors?
Compressed malware code is tricky to reverse and hard for AV to check
What is Packing?
Taking existing code, and compressing it so it takes up less space.
In the most common type of basic packer – the final file will have 2 main PE sections.
Dynamic Unpacking normally involves letting the file run until it is at the Original Entry Point, and then dumping memory:
What is the last thing a packer does?
The last thing the packer does is transfer control to the Original Entry Point (which you will often see referred to as OEP)
How can you identify a packer?
What is Entropy?
Entropy is essentially a mathematical formula to measure randomness or predictability. Packed data looks encrypted, so it has HIGH entropy. Tools to check entropy: DIE (Detect It Easy), DensityScout
Name tools to identify packers?
Name a few common packers?
What are the main steps to unpack code?
How does Dynamic Unpacking works?
Tips to find OEP?
Name a few tools to dump memory?
Name two tools to unpack packed code?