initial UPX obfuscator tool
This commit is contained in:
parent
542abff250
commit
d858b458e8
|
|
@ -75,3 +75,5 @@ Following detections have been tested:
|
|||
* <https://medium.com/analytics-vidhya/running-go-code-from-python-a65b3ae34a2d>
|
||||
* <https://github.com/weak1337/Alcatraz>
|
||||
* <https://github.com/burrowers/garble?tab=readme-ov-file#mechanism>>
|
||||
* <https://medium.com/@ankyrockstar26/unpacking-a-upx-malware-dca2cdd1a8de>
|
||||
* <https://www.mosse-security.com/2020/09/29/upx-malware-evasion-technique.html?ref=nishtahir.com>
|
||||
|
|
|
|||
|
|
@ -0,0 +1,37 @@
|
|||
package main
|
||||
|
||||
import (
|
||||
"os"
|
||||
"bytes"
|
||||
"log"
|
||||
)
|
||||
|
||||
var originalIdentifier = []byte("UPX0")
|
||||
var obfuscatedIdentifier = []byte("GSP7")
|
||||
|
||||
func main() {
|
||||
if len(os.Args) != 2 {
|
||||
log.Fatalln("Specify exe file to obfuscate")
|
||||
}
|
||||
|
||||
filename := os.Args[1]
|
||||
|
||||
log.Println("Obfuscating UPX compressed executable file")
|
||||
log.Println("\t", filename)
|
||||
|
||||
data, _ := os.ReadFile(filename)
|
||||
|
||||
foundIndex := bytes.Index(data, originalIdentifier)
|
||||
if foundIndex > -1 {
|
||||
// Found it!
|
||||
log.Println("Found UPX identifier at offset", foundIndex)
|
||||
} else {
|
||||
log.Fatalln("Error file is not UPX packed")
|
||||
}
|
||||
|
||||
|
||||
obfuscatedData := bytes.Replace(data, originalIdentifier, obfuscatedIdentifier, 1)
|
||||
_ = os.WriteFile(filename, obfuscatedData, 0666)
|
||||
|
||||
log.Println("done")
|
||||
}
|
||||
Loading…
Reference in New Issue