Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

reverse engineering exe file

Name: Anonymous 2012-07-06 5:12

so, usual spam mail, usual bogus url i SHOULD REALLY CLICK.
for a change, i opened said url on a debian VM, downloaded the "harmless" zip file and now i have this innocent .exe looking at me with puppy eyes because there is no System32 to crap into.
now, back to the title:
is there a nice tool to reverse engineer the little bugger, possibly not a single-language "decompiler" sure to shit everything up said bugger was code in another one?

any help/tip appreciated

Name: Cudder !MhMRSATORI!fR8duoqGZdD/iE5 2012-07-06 6:36

http://radare.org/

>>2
It will almost certainly be packed so objdump isn't going to show much. Loading it in a debugger is not really advised either, as they know about these sorts of things and won't make it easy for you. Anti-debugging, obscure tricks that can force a debugger to start running it even by just loading the file, etc. Your best bet is to use a framework like above and do a static, carefully controlled unpack first.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List