A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #21871  by rinn
 Sun Jan 05, 2014 2:33 pm
Xartrick wrote:
rinn wrote: It's really UPX. Just a bit scrambled. In attach unpacked, all interesting dll's inside in rsrc section. Even if upx -d failed you still can unpack it manually.
Did you figure what makes upx -d failing?
Yes. It doesn't like .Silvana section (that owns import), likely added by scrambler. It does nothing and only added to confuse UPX canUnpack() or whatever.

Cut off Silvana section from file, correct size of image in header
Restore Image Directory Import pointer
upx -d

Best Regards,
-rin
 #21873  by Xartrick
 Sun Jan 05, 2014 4:56 pm
rinn wrote:
Xartrick wrote:Did you figure what makes upx -d failing?
Yes. It doesn't like .Silvana section (that owns import), likely added by scrambler. It does nothing and only added to confuse UPX canUnpack() or whatever.

Cut off Silvana section from file, correct size of image in header
Restore Image Directory Import pointer
upx -d

Best Regards,
-rin
Thanks.

I go deeper, and found some interesting stuff.
The gate that receive the user's information still alive.
Code: Select all
hxxp://98.126.170.154/wow/wow.asp
It calls it with POST parameters:
Code: Select all
&WOWID=%s&Area=%s&WU=%s&WP=%s&MAX=%d/%d&Gold=%d&Serv=%s&rn=%s&key=%s
Code: Select all
WOWID => Wx32 (always (should be Wx64 for the x64 version))
Area => us or eu
WU => Account mail?
WP => Account password?
MAX => ?/?
Gold => Gold :)
Serv => Current server
rn => ?
key => ?