r2con2020_deobfuscation
r2con2020_deobfuscation copied to clipboard
Semi-automatic Code Deobfuscation
This repository contains slides, samples and code of the 2h code deobfuscation workshop at r2con2020. We use Miasm to automatically identify opaque predicates in the X-Tunnel APT128-malware using symbolic execution and SMT solving. Afterward, we automatically remove the opaque predicates via patching.
The recording is available here.
Cutter Notes
To correctly disassembly the targeted function in Cutter, the analysis depth has to been increased:
e anal.depth=9999
af @ 0x491aa0
s 0x491aa0
Contact
For more information, contact (@mr_phrazer).