Forum Discussion

RobN's avatar
RobN
Icon for Bronze III rankBronze III
20 days ago
Solved

python-scripting-for-malware-analysis-ep-5-code-obfuscation

Has anyone attempted this lab? I appear to be stuck after creating a python script to put the code through the loops - I can produce a deobfuscated block but have inspected it using both xxd and strings but was unable to find a hidden url. Curious if anybody has solved it yet.

  • there are several steps you need to do. 

    1. identify the block which you need to 'carve out' in binary
    2. then use routine #1 to process the data (tip: it's about swapping)
    3. then use routine #2 to further process the data (tip: it's about xor but not with the password pentioned in Q3)
    4. then use routine #3 to process the data (tip: it's about adding something to each byte)

    and then I think you'll see it somewhere as string at the end of the output. xx.xxxxxxxx.tld

    hope that helps.

  • there are several steps you need to do. 

    1. identify the block which you need to 'carve out' in binary
    2. then use routine #1 to process the data (tip: it's about swapping)
    3. then use routine #2 to further process the data (tip: it's about xor but not with the password pentioned in Q3)
    4. then use routine #3 to process the data (tip: it's about adding something to each byte)

    and then I think you'll see it somewhere as string at the end of the output. xx.xxxxxxxx.tld

    hope that helps.

    • RobN's avatar
      RobN
      Icon for Bronze III rankBronze III

      Thanks for this - this is what I've already tried.

      I've done each step of the offered solution and done both xxd and strings on the data although I wasn't looking for .tld. I shall try it again tonight using that as a search value as I used 'http' 'ftp' and '://' as search values.

      Thanks again.

       

      • steven's avatar
        steven
        Icon for Bronze III rankBronze III

        naah.. there's no ftp, http, :, ://, ... ist just 
        ix.sixxwxxlxxxxxxx.xs  (where x is [a-z]).