DiscoverOALabsHow Do Packers Work - Reverse Engineering "FUD" Aegis Crypter
How Do Packers Work - Reverse Engineering "FUD" Aegis Crypter

How Do Packers Work - Reverse Engineering "FUD" Aegis Crypter

Update: 2018-09-22
Share

Description

Open Analysis Live! We reverse engineer the Aegis Crypter and take a look at how packers work from the malware developer's perspective...

Calc.exe packed with Aegis Crypter:
Sha256:
https://malshare.com/sample.php?action=detail&hash=8381bd4dfc24fb2d5d664b179606dec4

Aegis Crypter (7zip archive of the tools):
https://malshare.com/sample.php?action=detail&hash=fff7ee5231e6089efbd60e1264b002a0

Deep-dive tutorial on defeating anti-analysis and anti-VM checks:
https://www.youtube.com/watch?v=WlE8abc8V-4

Analysis VM setup tutorial:
https://www.youtube.com/watch?v=gFxImi5t37c

Feedback, questions, and suggestions are always welcome : )

Sergei https://twitter.com/herrcore
Sean https://twitter.com/seanmw

As always check out our tools, tutorials, and more content over at http://www.openanalysis.net
Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

How Do Packers Work - Reverse Engineering "FUD" Aegis Crypter

How Do Packers Work - Reverse Engineering "FUD" Aegis Crypter

OALabs