In this video I show how we can create functions when IDA fails because of the usage of opaque predicates, a common anti-disassembling trick. We will also see how we can statically decrypt the malware using a technique called (by the AV industry) as X-Rays.
This malware was called "FlyStudio" by some AV companies. The MD5 hash of the sample analysed in the video is the following one: 09002944F0F0EEC37B022507919C3538. You can download the malware samples from this URL:
Be the first to comment