JaonLin / pin_unpacking_antievasion

A pintool in order to unpack malware and avoid the evasion techniques

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Pin unpacking and anti-evasion

Dependencies

Installation

  1. Download the linked version of PIN

  2. Unzip PIN to the root directory and rename the folder to pin

  3. Clone this repository

  4. Open the file PinUnpacker.sln with Visual Studio 2010 ( NB: The version is mandatory )

  5. Set your IDAPro path in Log.cpp ( const Log::IDA_PATH )

  6. Copy the folders FindOEPPin\PinUnpackerDependencies and FindOEPPin\PinUnpackerResults in C:\pin\

  7. Compile the solution

	\---C
	    \---pin
			   \+---source
			   	| 	     
			   	|
			   	|
			   \+---PinUnpackerResults
			   	|
			   	|
			   	|
			   	|
			   \+---PinUnpackerDependencies 
			   	|						  \---badImportsChecker.py
			   	|			              \---badImportsList.txt
			   	|						  \---dumperSelector.py
			   	|						  \---Scylla
			   	|								\---ScyllaDLLx64.dll
			   	|								\---ScyllaDLLx86.dll
			   	|								\---ScyllaDumper.exe
			   	|
			   \+---FindOEPPin.dll

Usage

  1. Run this command from the directory C:\pin\

    pin -t FindOEPPin.dll -- <path_to_the_exe_to_be_instrumented>
    
  2. Check your result in C:\pin\PinUnpackerResults\< current_date_and_time >\

About

A pintool in order to unpack malware and avoid the evasion techniques


Languages

Language:C++ 98.2%Language:C 1.0%Language:Python 0.6%Language:Makefile 0.1%Language:Batchfile 0.1%