Kayaker
March 1st, 2006, 18:03
I thought some people might be interested in this prize challenge by insecure.org. There are 3 files, 2 PE and 1 ELF, the PE files have modified sections with the names .adata and .svkp, PEiD identifies them as ASProtect 1.2x - 1.3x and SVKP 1.3x.
http://seclists.org/lists/fulldisclosure/2006/Jan/0814.html
=== CSRRT-LU Malware Contest ===
Sometime ago, we made the [[Honeylux]] contest and it was a very funny
and interesting contest. Now inside various projects at CSRRT-LU, we
are collecting a lot of undefined malware. We would like to give the
ability to all the people that are interested to better understand
what malware is doing. So if you want to give a try and maybe
win... just pick the following files and read the very basic rules.
I like the idea of this type of challenge. Personally though, I think having to wade through the apparent unpacking chores first to get at the "malware" analysis itself, makes it less appealing to the larger population of those who might want to try the challenge. A good piece of malware should withstand intense analysis even without being protected by a registered copy of Asprotect. Seems a bit more like an RE employment exam, "You got the skillZ boy?
Regards,
Kayaker
http://seclists.org/lists/fulldisclosure/2006/Jan/0814.html
=== CSRRT-LU Malware Contest ===
Sometime ago, we made the [[Honeylux]] contest and it was a very funny
and interesting contest. Now inside various projects at CSRRT-LU, we
are collecting a lot of undefined malware. We would like to give the
ability to all the people that are interested to better understand
what malware is doing. So if you want to give a try and maybe
win... just pick the following files and read the very basic rules.
I like the idea of this type of challenge. Personally though, I think having to wade through the apparent unpacking chores first to get at the "malware" analysis itself, makes it less appealing to the larger population of those who might want to try the challenge. A good piece of malware should withstand intense analysis even without being protected by a registered copy of Asprotect. Seems a bit more like an RE employment exam, "You got the skillZ boy?
Regards,
Kayaker


?
I do think unpacking is a very valuable skill, but packing virii and then asking to analyze diverts the focus, at least for me. One can gain a lot of info hooking syscalls and using some basic network tools. Then, if there is something missing you need to debug, use IDA, etc.