Skip to main content

Unpack and unwrapping executables protected with Themida 3.1.3 by BOB11_Bobalkkagi

Project description

TEAM Bobalkkagi

BOB11 project

Unpacking & Unwrapping & Devirtualization(Not yet) of Themida 3.1.3 packed program(Tiger red64)

API Hook

Hooking API based win10_v1903

How to

Install

pip install bobalkkagi

or

pip install git+https://github.com/hackerhoon/bobalkkagi.git

Notes

Need default Dll folder(win10_v1903) or you can give dll folder path

win10_v1903 folder is in https://github.com/hackerhoon/bobalkkagi

Use

NAME
    bobalkkagi

SYNOPSIS
    bobalkkagi PROTECTEDFILE <flags>

POSITIONAL ARGUMENTS
    PROTECTEDFILE
        Type: str

FLAGS
    --mode=MODE
        Type: str
        Default: 'f'
    --verbose=VERBOSE
        Type: str
        Default: 'f'
    --dllPath=DLLPATH
        Type: str
        Default: 'win10_v1903'
    --oep=OEP
        Type: str
        Default: 't'
    --debugger=DEBUGGER
        Type: str
        Default: 'f'

NOTES
    You can also use flags syntax for POSITIONAL ARGUMENTS

Option Description


Mode: f[fast], c[hook_code], b[hook_block]


Description: Mean emulating mode, we implement necessary api to unpack protected excutables by themida 3.1.3.

Running on fast mode compare rip with only hook API function area size 32(0x20), but hook_block mode and hook_code mode compare rip with all mapped DLL memory (min 0x1000000) to check functions. block mode emulate block size(call, jmp) code mode do it opcode by opcode.

verbose


verbose show Loaded DLL on memory, we will update it to turn on/off HOOKING API CALL info.

dllPath


dllPath is directory where DLLs to load on memory exists. DLLs are different for each window version. This tool may be not working with your window DLL path(C:\Windows\System32)

oep


oep is option to find original entry point. If you turn off this option, you can emulate program after oep**(fast mode can't do it, it works on hook_block and hook_code)**

debugger


If you want unpack another protector or different version of themida, you should add necessary hook_api functions(anti debugging, handle, syscall). you can analyze protected program hook_code mode or hook_block mode(more detail in https://github.com/unicorn-engine/unicorn) with debugger ** option(working only hook_code mode!)**

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

bobalkkagi-0.2.2.tar.gz (7.9 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

bobalkkagi-0.2.2-py3-none-any.whl (7.9 MB view details)

Uploaded Python 3

File details

Details for the file bobalkkagi-0.2.2.tar.gz.

File metadata

  • Download URL: bobalkkagi-0.2.2.tar.gz
  • Upload date:
  • Size: 7.9 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.3.0 CPython/3.10.9 Windows/10

File hashes

Hashes for bobalkkagi-0.2.2.tar.gz
Algorithm Hash digest
SHA256 0a1000b2616f39489673124a69ab4157fd3927bbadd089cf2ab81d806cc985fd
MD5 b93b5fef7b82637f8e92e3bb9da48d02
BLAKE2b-256 ea4eb84764f1e4a525d601c7114457ca104f8cd1cdbb2eea794905383c5a582e

See more details on using hashes here.

File details

Details for the file bobalkkagi-0.2.2-py3-none-any.whl.

File metadata

  • Download URL: bobalkkagi-0.2.2-py3-none-any.whl
  • Upload date:
  • Size: 7.9 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.3.0 CPython/3.10.9 Windows/10

File hashes

Hashes for bobalkkagi-0.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 7bcfcba78ef3007d3b009a6ccbe3a6f3d3434302d7932bfbcbcf456b1a78398c
MD5 c069edea9c4d4e18852ba0a12388112a
BLAKE2b-256 69a9c641edd0109db4ca4dcebbe516b1e8b6f95a08c7da968af7ea224ddf93e5

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page