I have tried to dump the malware from this thread http://www.kernelmode.info/forum/viewto ... =21&t=2288 but the dumped binary does not contain the code.
I tried dumping with my own code and with this program http://code.google.com/p/mdmp/. None of them dumped correctly.
Why does it happen?
In this article http://blogs.avg.com/news-threats/anti- ... r-malware/ is said:
"The malicious code itself is protected by double packer layers. The top one is some custom cryptor which executes several anti emulation tricks such as calling rare API functions and decrypting the MPress packed executable to its own memory. After unpacking this inner MPress packer, we finally get the malicious code."
I guess I should be dumping other memory area, but how to notice that?
I tried dumping with my own code and with this program http://code.google.com/p/mdmp/. None of them dumped correctly.
Why does it happen?
In this article http://blogs.avg.com/news-threats/anti- ... r-malware/ is said:
"The malicious code itself is protected by double packer layers. The top one is some custom cryptor which executes several anti emulation tricks such as calling rare API functions and decrypting the MPress packed executable to its own memory. After unpacking this inner MPress packer, we finally get the malicious code."
I guess I should be dumping other memory area, but how to notice that?