Skip to main content

Unpack and unwrapping executables protected with Themida 3.1.3 by BOB11_Bobalkkagi

Project description

TEAM Bobalkkagi

BOB11 project

Unpacking & Unwrapping & Devirtualization(Not yet) of Themida 3.1.3 packed program(Tiger red64)

API Hook

Hooking API based win10_v1903

How to

Install

pip install bobalkkagi

or

pip install git+https://github.com/hackerhoon/bobalkkagi.git

Notes

Need default Dll folder(win10_v1903) or you can give dll folder path

win10_v1903 folder is in https://github.com/hackerhoon/bobalkkagi

Use

NAME
    bobalkkagi

SYNOPSIS
    bobalkkagi PROTECTEDFILE <flags>

POSITIONAL ARGUMENTS
    PROTECTEDFILE
        Type: str

FLAGS
    --mode=MODE
        Type: str
        Default: 'f'
    --verbose=VERBOSE
        Type: str
        Default: 'f'
    --dllPath=DLLPATH
        Type: str
        Default: 'win10_v1903'
    --oep=OEP
        Type: str
        Default: 't'
    --debugger=DEBUGGER
        Type: str
        Default: 'f'

NOTES
    You can also use flags syntax for POSITIONAL ARGUMENTS

Option Description


Mode: f[fast], c[hook_code], b[hook_block]


Description: Mean emulating mode, we implement necessary api to unpack protected excutables by themida 3.1.3.

Running on fast mode compare rip with only hook API function area size 32(0x20), but hook_block mode and hook_code mode compare rip with all mapped DLL memory (min 0x1000000) to check functions. block mode emulate block size(call, jmp) code mode do it opcode by opcode.

verbose


verbose show Loaded DLL on memory, we will update it to turn on/off HOOKING API CALL info.

dllPath


dllPath is directory where DLLs to load on memory exists. DLLs are different for each window version. This tool may be not working with your window DLL path(C:\Windows\System32)

oep


oep is option to find original entry point. If you turn off this option, you can emulate program after oep**(fast mode can't do it, it works on hook_block and hook_code)**

debugger


If you want unpack another protector or different version of themida, you should add necessary hook_api functions(anti debugging, handle, syscall). you can analyze protected program hook_code mode or hook_block mode(more detail in https://github.com/unicorn-engine/unicorn) with debugger ** option(working only hook_code mode!)**

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

bobalkkagi-0.2.4.tar.gz (7.9 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

bobalkkagi-0.2.4-py3-none-any.whl (7.9 MB view details)

Uploaded Python 3

File details

Details for the file bobalkkagi-0.2.4.tar.gz.

File metadata

  • Download URL: bobalkkagi-0.2.4.tar.gz
  • Upload date:
  • Size: 7.9 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.3.0 CPython/3.10.9 Windows/10

File hashes

Hashes for bobalkkagi-0.2.4.tar.gz
Algorithm Hash digest
SHA256 248af88e0f54fae2d3d54217e2ff55c537eb162add5ca4b39d1597834bf16099
MD5 69e80752d501309f101fa2336a9715d9
BLAKE2b-256 264257238ef4841c852fcf849075d1246512dcd816079e6524255bfa3b724093

See more details on using hashes here.

File details

Details for the file bobalkkagi-0.2.4-py3-none-any.whl.

File metadata

  • Download URL: bobalkkagi-0.2.4-py3-none-any.whl
  • Upload date:
  • Size: 7.9 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.3.0 CPython/3.10.9 Windows/10

File hashes

Hashes for bobalkkagi-0.2.4-py3-none-any.whl
Algorithm Hash digest
SHA256 018537b2d6569132fd3b0bd9d3d74a7dc235af52f9508c04ba567a7128737702
MD5 eeb876f940bfbe7ec593f9a24c3109c4
BLAKE2b-256 68f6231574dcf86488f4d8effaab4a62cb2ac0e37792f21ac9b28486a3b7c79f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page