Skip to main content

Unpack and unwrapping executables protected with Themida 3.1.3 by BOB11_Bobalkkagi

Project description

TEAM Bobalkkagi

BOB11 project

Unpacking & Unwrapping & Devirtualization(Not yet) of Themida 3.1.3 packed program(Tiger red64)

API Hook

Hooking API based win10_v1903

How to

Install

pip install bobalkkagi

or

pip install git+https://github.com/hackerhoon/bobalkkagi.git

Notes

Need default Dll folder(win10_v1903) or you can give dll folder path

win10_v1903 folder is in https://github.com/hackerhoon/bobalkkagi

Use

NAME
    bobalkkagi

SYNOPSIS
    bobalkkagi PROTECTEDFILE <flags>

POSITIONAL ARGUMENTS
    PROTECTEDFILE
        Type: str

FLAGS
    --mode=MODE
        Type: str
        Default: 'f'
    --verbose=VERBOSE
        Type: str
        Default: 'f'
    --dllPath=DLLPATH
        Type: str
        Default: 'win10_v1903'
    --oep=OEP
        Type: str
        Default: 't'
    --debugger=DEBUGGER
        Type: str
        Default: 'f'

NOTES
    You can also use flags syntax for POSITIONAL ARGUMENTS

Option Description


Mode: f[fast], c[hook_code], b[hook_block]


Description: Mean emulating mode, we implement necessary api to unpack protected excutables by themida 3.1.3.

Running on fast mode compare rip with only hook API function area size 32(0x20), but hook_block mode and hook_code mode compare rip with all mapped DLL memory (min 0x1000000) to check functions. block mode emulate block size(call, jmp) code mode do it opcode by opcode.

verbose


verbose show Loaded DLL on memory, we will update it to turn on/off HOOKING API CALL info.

dllPath


dllPath is directory where DLLs to load on memory exists. DLLs are different for each window version. This tool may be not working with your window DLL path(C:\Windows\System32)

oep


oep is option to find original entry point. If you turn off this option, you can emulate program after oep**(fast mode can't do it, it works on hook_block and hook_code)**

debugger


If you want unpack another protector or different version of themida, you should add necessary hook_api functions(anti debugging, handle, syscall). you can analyze protected program hook_code mode or hook_block mode(more detail in https://github.com/unicorn-engine/unicorn) with debugger ** option(working only hook_code mode!)**

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

bobalkkagi-0.2.0.tar.gz (7.9 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

bobalkkagi-0.2.0-py3-none-any.whl (7.9 MB view details)

Uploaded Python 3

File details

Details for the file bobalkkagi-0.2.0.tar.gz.

File metadata

  • Download URL: bobalkkagi-0.2.0.tar.gz
  • Upload date:
  • Size: 7.9 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.3.0 CPython/3.10.9 Windows/10

File hashes

Hashes for bobalkkagi-0.2.0.tar.gz
Algorithm Hash digest
SHA256 457b0cf68a330380dcc5ec2fbdfcca6455e332e81b1813e85004818d80a47071
MD5 9a7bbc51bf31b35e3ec5b77d9c490d5e
BLAKE2b-256 5984890b9e4e126491543ffa737870b4a5fd99673721be93a97196ae1b17f415

See more details on using hashes here.

File details

Details for the file bobalkkagi-0.2.0-py3-none-any.whl.

File metadata

  • Download URL: bobalkkagi-0.2.0-py3-none-any.whl
  • Upload date:
  • Size: 7.9 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.3.0 CPython/3.10.9 Windows/10

File hashes

Hashes for bobalkkagi-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 cc9018251c887bb11848d0e93159c7be1846349d16961442454d0625905f77e5
MD5 c2ba83897a1b6ceea253868dc582a704
BLAKE2b-256 567b3ad9b3ed989b26ee8fc6a12fdc512845414be17ce0c40622deb65cd5660c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page