A forum for reverse engineering, OS internals and malware analysis 

Search found 22 matches: mpress

Searched query: mpress

 Go to advanced search

Re: MPRESSed samples

 by EP_X0FF ¦  Fri Jun 21, 2013 8:22 am ¦  Forum: Malware ¦  Topic: MPRESSed samples ¦  Replies: 5 ¦  Views: 9955

MPRESSed samples

 by Marc Ochsenmeier ¦  Fri Jun 21, 2013 7:33 am ¦  Forum: Malware ¦  Topic: MPRESSed samples ¦  Replies: 5 ¦  Views: 9955

I am testing a tool to detect images compressed with MPRESS and need many samples specifically compressed with MPRESS to validate the tool.
Does someone knowns a URL where I could find this specific kind of samples?

Re: Rogue Antimalware (FakeAV, 2013 year)

 by EP_X0FF ¦  Sat Jun 15, 2013 4:29 pm ¦  Forum: Malware ¦  Topic: Rogue Antimalware (FakeAV, 2013 year) ¦  Replies: 142 ¦  Views: 223040

Last stage mpress with not fixed iat, doesn't matter, resources and other crap readable. 2stage.exe_bin - TDL3 style injector with 3 stage in .inst section encrypted 3stage.exe_bin - decrypted .inst executable, next dropper with ...

Re: Rogue Antimalware (FakeAV, 2013 year)

 by EP_X0FF ¦  Sat Jun 15, 2013 3:03 pm ¦  Forum: Malware ¦  Topic: Rogue Antimalware (FakeAV, 2013 year) ¦  Replies: 142 ¦  Views: 223040

... Name of malware + C&C as I understand. 3. Next stage dropper written in C++, purpose - decrypt 4 stage malware body 4. MPRESS compressed actual FakeAV body. Maybe I missed something, just did quick looking. If you need any layers from this crap let me know.

Re: Dumping malware process

 by EP_X0FF ¦  Fri Dec 28, 2012 11:10 am ¦  Forum: Malware ¦  Topic: Win32/Caphaw (Shylock) ¦  Replies: 46 ¦  Views: 54931

Third - actual malware running from MPRESS allocated region (again different from the original imagebase). Here all AntiVM tricks being executed. Itself this is Backdoor:Win32/Caphaw.D In attach MPRESS binary extracted from 1st layer. Decompress ...

Re: Dumping malware process

 by EP_X0FF ¦  Sun Dec 23, 2012 2:18 pm ¦  Forum: Malware ¦  Topic: Win32/Caphaw (Shylock) ¦  Replies: 46 ¦  Views: 54931

... 0x00B80000 region), trace after call with ERW flags, it will dexor (whatever) container in @ContainerAddress and then call second stage. Second - MPRESS v2.18 running from @ContainerAddress. Unpacking MPRESS is somehow similar to unpacking previous one. Result = allocated memory region with ERW ...

Dumping malware process

 by Buster_BSA ¦  Sun Dec 23, 2012 11:57 am ¦  Forum: Malware ¦  Topic: Win32/Caphaw (Shylock) ¦  Replies: 46 ¦  Views: 54931

... layers. The top one is some custom cryptor which executes several anti emulation tricks such as calling rare API functions and decrypting the MPress packed executable to its own memory. After unpacking this inner MPress packer, we finally get the malicious code." I guess I should be dumping ...

forking as system exe: packing and exception issues

 by rndbit ¦  Wed Oct 26, 2011 1:02 pm ¦  Forum: User-Mode Development ¦  Topic: forking as system exe: packing and exception issues ¦  Replies: 4 ¦  Views: 5945

... sections to the created process and resume thread). It works as long as no packing to my custom executable is applied. When i pack my exe with upx/mpress then forked instance (code running in windows svchost.exe) can not catch c++ exceptions. Throwing exception results in termination of application. ...

Re: Malware/Not classified

 by EP_X0FF ¦  Wed Oct 05, 2011 5:06 pm ¦  Forum: Malware ¦  Topic: Win32/Phorpiex (alias Phokace, Trik) ¦  Replies: 17 ¦  Views: 31706

... Trojan downloader Phokace with AntiVM. Payload hxxp://www.allezdax.com/images/m.exe (crypted and packed by MPRESS Worm:Win32/Phorpiex.B ) decrypted downloader, payload + decrypted in attach Windows Live Messenger spam templates ICQ Conversations - MiniUserProfileDlg ...

Re: Rootkit TDL 4 (alias TDSS, Alureon.DX, Olmarik)

 by EP_X0FF ¦  Wed Mar 30, 2011 4:28 pm ¦  Forum: Malware ¦  Topic: Rootkit TDL 4 (alias TDSS, Alureon.DX, Olmarik) ¦  Replies: 595 ¦  Views: 654747

@freyr The TDL packer is nothing special. As NOP already said you can retrieve all sensitive data (drv loader, cmd.dll (UPX), cmd64.dll (MPRESS) except cfg.ini because it constructs by cmd.dll in runtime) by simple dumping to disk whole allocated region. However unpacking each TDL sample is ...