[Release] Unpacked XignCode Files

11/25/2010 20:46 demonkiller19#16
Quote:
Originally Posted by ChinkyTinky View Post
i think this just became really really interesting


hey xigncode uses this to load/dl xxd.xem


[Only registered and activated users can see links. Click Here To Register...]
*Off-Topic
much virus scanners see this as a virus.... (i think they think its a trojan....)
11/26/2010 01:47 inVINCEable#17
It uses rootkit methods to protect the Dekaron process. Therefore it is sometimes detected as a virus.
11/27/2010 07:19 edman3#18
Analyzed it weeks before but could brake the code.=[
11/27/2010 16:03 huquinho#19
if you guys watch the xigncode it downloads a file called vtany.sys which is in the folder ?:\WINDOWS and the avast detects as a virus "Win32: Rootkit-gen [RTK]" I have helped.
11/27/2010 18:39 d4kman#20
its work ?
11/27/2010 20:30 HellSpider#21
Quote:
Originally Posted by huquinho View Post
if you guys watch the xigncode it downloads a file called vtany.sys which is in the folder ?:\WINDOWS and the avast detects as a virus "Win32: Rootkit-gen [RTK]" I have helped.
Yep it's a driver for XignCode.

Quote:
Originally Posted by d4kman View Post
its work ?
What is working?
11/27/2010 21:04 d4kman#22
i meen that is like a bypass ? and its work ?
11/27/2010 22:26 ~Kakkarot~#23
Quote:
Originally Posted by HellSpider View Post
Hi.



Note! This is not a XignCode bypass! These files are just for analyzing purposes!
Please read the thread next time
11/28/2010 02:18 PureEnergy3#24
Quote:
Most of the files were protected by Themida (one of the newest versions), and some of those had a part of their code virtualized. As I am not able to devirtualize Themida VMs I have stripped them from the files.
Could'nt you just find out where the code jumps to VM Make a break point inside and dump?
Edit : Or does themidia stop that? Not that familiar with it
11/28/2010 12:01 HellSpider#25
Quote:
Originally Posted by PureEnergy3 View Post
Could'nt you just find out where the code jumps to VM Make a break point inside and dump?
Edit : Or does themidia stop that? Not that familiar with it
That can't be done just because it is a virtual machine. It's not stolen bytes that you can trace easily. Themida VM works this way, it obfuscates the real code, then translates the obfuscated stuff into it's own VM opcodes, and then the newer versions even obfuscate the VM handlers.

Consider this piece of code:


Can you resolve what it does, because I can't (it's supposed to be only some lines of real code) ;)

(Note! It's just an example, it's just a small part of the VM code)
11/29/2010 02:37 inVINCEable#26
Just some extra info.

XIGN seems to communicate with this URL "http://222.231.57.223/x2/xls2.cgi"

Folder: [Only registered and activated users can see links. Click Here To Register...] contains python code?

The file seems to return +100. which I believe is a good code and +300. for errors.

Random folder names that may contain Xign files.

Base URL: [Only registered and activated users can see links. Click Here To Register...]
Code:
X77cjckcIB84CNt
   Dekaron_CNt   Ze7cxckcIB4rUSt   SuddenAttack_USt   S37cccjcVi8vKRs   Wellbia.comt   FF7cjcycIB38TWt   Aceonline_TWt   _97cpcxcIB3AJPt   Pristontale_JPt   lX7cjcxcIB4PTWt   Pristontale2_TWt   X77cjckcIB84JPt
   Dekaron_JPt   X77cjckcIB84TWt
   Dekaron_TWt   X77cjckcIB84THt
   Dekaron_THt   X77cjckcIB84PHt
   Dekaron_PHt   X77cjckcIB84USt
   Dekaron_USt   X77cjckcIB84KRt
   Dekaron_KRt   aFccpckcIB7yJPt   GoGoXing_JPt   FF7cjcycIB38CNt   Aceonline_CNt   Y57cdckcIB4aKRt	   Zombie_KRt   B77cjcXcIB8LJPt   SpellBorn_JPt   _97cpcxcIB3ATWt   Pristontale_TWt   iScckckcIB7FKRt   MetalRage_KRt   pmccPckcIB7nKRt	   Spring_KRc
12/02/2010 01:49 KilerSpyZer#27
OllyDBG VMProtect Edition
A version of OllyDbg specifically modified to allow debugging of VMProtect protected applications.

[Only registered and activated users can see links. Click Here To Register...]


Olly 9in1 for Themida
A version of OllyDbg specifically modified to allow debugging of Themida protected applications

[Only registered and activated users can see links. Click Here To Register...]


and this

RAMODBG
OllyDbg moded for ExeCryptor & THEMIDA
Add the possibility of deleting all points of stopping Remove all breakpoints
Auto path UDD & plugin
Reference search directly from the toolbar
Show offset in status bar
Amendment to show the number of additions to the list
Additions located



With PlugIns:
advancedolly.dll
analyzethis.dll
API_Break.dll
bookmarks2.dll
cmdbar.dll
HideOD.dll
NonaWrite.dll
ODbgScript.dll
OllyBugfix.dll
OllyDump.dll
OllyMoreMenu.dll
PhantOm.dll
Poison.dll
ustrref.dll

[Only registered and activated users can see links. Click Here To Register...]







IF U LIKE PRESS THANKS,:D my little contribution
12/02/2010 09:21 ChinkyTinky#28
Kilerspell, could u describe what these files do and so on for us noobs :/, thanks :)
12/02/2010 11:40 HellSpider#29
Quote:
Originally Posted by ChinkyTinky View Post
Kilerspell, could u describe what these files do and so on for us noobs :/, thanks :)
They're just different modifications of OllyDbg 1.10. If you got no experience with using OllyDbg or any other debugger this it probably nothing for you (unless you are interested in learning to reverse applications :)).
01/09/2011 19:49 2mooons#30
I cracked it