A forum for reverse engineering, OS internals and malware analysis 

Forum for announcements and questions about tools and software.
 #6876  by EP_X0FF
 Mon Jun 20, 2011 3:12 am
All this hiding is complete wasting of time. Yes you can smudge your code within the address space of the victim, use tandem of trampolines, morph handlers and so on, but it's not worth a damn, because the logger is working with the sandbox components, which are not possible to completely hide (without breaking their functionality) without sandbox native support. This is just a sandbox, not a VM.
I suggest Buster to only unlink dll from lists (or/and randomize/fake it name) and forget about everything else.
 #6938  by Buster_BSA
 Fri Jun 24, 2011 4:14 pm
Released Buster Sandbox Analyzer 1.36.

Changes:

+ Added support for ssdeep
+ Improved the support for DLL files
+ Report informations can be selected individually
+ Updated BSA.DAT
+ Fixed several bugs
 #7340  by Buster_BSA
 Sat Jul 16, 2011 11:02 pm
Released Buster Sandbox Analyzer 1.37.

Changes:

* Improved hiding feature
* Updated BSA.DAT
* Removed evaluation risk feature
* Fixed several bugs

Part of the improved hiding feature is the possibility of naming LOG_API.DLL with the file name you prefer.

Evaluation risk was removed from malware analysis report because it was too misleading. Probably I will reintroduce the feature in the near future but having other format.
Last edited by Buster_BSA on Sat Jul 16, 2011 11:12 pm, edited 1 time in total.
 #7462  by Mr.Bojangles
 Wed Jul 20, 2011 6:51 pm
I'll check it out. I've been busy with some contracts lately, but still use the tool.

If you don't use the SB API and EP you can hide from everything except self-debugging with inline-hooking.
 #7469  by Buster_BSA
 Wed Jul 20, 2011 10:39 pm
Mr.Bojangles wrote:I'll check it out. I've been busy with some contracts lately, but still use the tool.

If you don't use the SB API and EP you can hide from everything except self-debugging with inline-hooking.
Thanks for checking!

What´s the meaning of EP? Entry Point?
  • 1
  • 15
  • 16
  • 17
  • 18
  • 19
  • 32