Unpacking Emotet / Geodo (Stage 1) Using x64dbg - Subscriber Request
Video Statistics and Information
Channel: OALabs
Views: 17,905
Rating: 4.9326925 out of 5
Keywords: emotet, geodo, malware, unpacking, debugger, x64dbg, pe-bear, IAT rebuild, open analysis live, openanalysis.net
Id: 4VBVMKdY-yg
Channel Id: undefined
Length: 15min 35sec (935 seconds)
Published: Sun Feb 18 2018
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.
looks like another channel to binge.
I liked the video, really engaging. At 9:21 in the video you got a typo though, and put in 0x600000 (one extra 0) which might be why your imports failed?
I feel a little pedantic mentioning this, but this seemed like an example of reflective loading rather than traditional packing. I've seen samples that just throw the real executable in the resource section then load them up like yours did, so sometimes you can skip the whole fixing-up if you catch it before its loaded.
u/herrcore - Lovin the channel man. I've tried to follow this thread to analyze a recent emotet sample but not having luck rebuilding the import table (the script gives 0 output). Able to take a look?
https://www.virustotal.com/#/file/10c5df8ad6bb3bff3174f300e558be862aa0274cd84a9bc130120aeec8b858d2/detection
Keep up the great work and content!