How to Unpack FlawedAmmyy - Malware Unpacking Tutorial

Subscribers:
180,000
Published on ● Video Link: https://www.youtube.com/watch?v=D1-O19AwW8U



Category:
Tutorial
Duration: 10:25
10,345 views
250


Defeating Commercial Packers Like a Pro - VMProtect, ASPack, PECompact, FlawedAmmyy, Ramnit Dropper and more. Learn how to unpack 5 different packers & malware samples in this malware analysis & unpacking tutorial series. Playlist = https://www.youtube.com/watch?v=D1-O19AwW8U&list=PLt9cUwGw6CYGfoSL9PUlpKi23z0_R2gz-

Zero2Auto 10% Coupon Code = "GUIDEDHACKING"
https://courses.zero2auto.com/?coupon=GUIDEDHACKING
^Automatically applied with the link above^

This was originally a 1 hour unpacking tutorial but we broke it down into smaller parts for easier viewing in our How to Unpack Malware tutorial series. Subscribe to get notified of the next videos. The videos in this series are:

-How to unpack FlawedAmmyy ( Ammyy Admin )
-How to unpack Ramnit Dropper
-How to unpack VMProtect (no virtualization)
-How to unpack PECompact
-How to unpack ASPack

Complete Playlist: https://www.youtube.com/playlist?list=PLt9cUwGw6CYGfoSL9PUlpKi23z0_R2gz-

A packer is a piece of software which obfuscates the original binary on disk, they started as very simple programs which just did a simple xor against the original bytes. The original code would be replaced with a stub, and the stub would xor the original binary, map it into memory and then execute the original code. In this way, static analysis is impossible. But in this How to Unpack tutorial series you will learn the ins and outs of unpacking binaries, including malware samples. Unpacking malware is something as a malware analyst you would have to do quite frequently, as almost all malware uses packers to evade antivirus detection. While packers have become increasing complicated over the years, unpacking them still follows the same steps and has the same goal. The point of unpacking a binary is to enable static analysis, once you have dumped the original binary to disk, you can begin to reverse engineer it..

In this How to Unpack Tutorial you will learn how to unpack FlawedAmmyy, a RAT also known as the Ammyy Admin malware. Ammyy Admin is a "legitimate" piece of software used to adminster remote computers, the developers of the malware took the "legitimate" software modified it for their malicious needs. FlawedAmmyy was most active in 2018-2019 and was spread via malicious Office document macros via email. FlawedAmmyy is essentially a RAT, which has the ability to record camera & microphone, take screenshots, steal credentials & files plus all the features which were included in the original Ammyy Admin software. The source code had leaked at some point, and the bad actors modified it for their needs.

If you follow all of these unpacking videos you will be well quite knowledgeable on the topic and well prepared to unpack the next packed program you come across.

Discussion: https://guidedhacking.com/threads/how-to-unpack-flawedammyy-malware-unpacking-tutorial.16637/

Malware Hashes (MD5 - all on VirusBay):
Ammyy: 7fb83e646cbabc50bec4b33c8130b5ae
ASPack: 9cc1b039aa8e4a98da3c390fdacc414c
PECompact: ad8cd029b32568830c8304f6075bb805
Ramnit: 6ee3d4e6b9cec67165e90f7ee7c9c33b
VMProtect: a39b4f74b5108a2b9f1a33b2feb22cc5

Support us on Patreon: http://bit.ly/38mnveC
Donate on our Forum : http://bit.ly/2HkOco9
Follow us on Facebook : http://bit.ly/2vvHfhk
Follow us on Twitter : http://bit.ly/3bC7J1i
Follow us on Twitch : http://bit.ly/39ywOZ2
Follow us on Reddit : http://bit.ly/3bvOB57
Follow us on GitHub : http://bit.ly/2HoNXIS
Follow us on Instagram : http://bit.ly/2SoDOlu
#MalwareAnalysis #FlawedAmmyy #Malware







Tags:
guidedhacking
how to unpack
malware analysis
how to unpack binaries
unpacking tutorial
malware unpacking
flawedammyy
malware analysis tutorial
flawedammyy analysis
flawedammyy malware
ammyy admin malware
how to unpack tutorial
zero 2 automated
zero2automated
reverse engineering
how to unpack malware
flawedammyy rat
malware analysis for beginners
practical malware analysis
malware analysis tools
reverse engineering tutorial
reverse engineering malware