Home

Awesome

Semi-automatic Code Deobfuscation

This repository contains slides, samples and code of the 2h code deobfuscation workshop at r2con2020. We use Miasm to automatically identify opaque predicates in the X-Tunnel APT128-malware using symbolic execution and SMT solving. Afterward, we automatically remove the opaque predicates via patching.

The recording is available here.

Cutter Notes

To correctly disassembly the targeted function in Cutter, the analysis depth has to been increased:

e anal.depth=9999
af @ 0x491aa0
s 0x491aa0

Contact

For more information, contact (@mr_phrazer).