This repository contains slides, samples and code of the 2h code deobfuscation workshop at r2con2020. We use Miasm
to automatically identify opaque predicates in the X-Tunnel
APT128-malware using symbolic execution and SMT solving. Afterward, we automatically remove the opaque predicates via patching.
The recording is available here.
To correctly disassembly the targeted function in Cutter
, the analysis depth has to been increased:
e anal.depth=9999
af @ 0x491aa0
s 0x491aa0
For more information, contact (@mr_phrazer).