Introduction: The idea of having an opcode emulator in a virus scanner to decrypt a very polymorphic virus isn't a novelty anymore. The more decent scanners can handle viruses that have a complex decryptor, using a generic decryptor to take the protective shell from the virus away, making the structures of the virus very visible to the scanner. So far, every polymorphic engine that is designed is able to make a certain type of decryptor, with variations in it's general behaviour, but not a generic encryptor. Since we, virus writers, also must adapt to newer programming technologies, a further step in virus advancement is generic programming. This generic programming can be used for any sort of virus related approach. Background: Every polymorphic engine is based on certain rules that will be used in a random order and trash instructions and instructions that compose another opcode. But what about a polymorphic engine you can feed a piece of CODE to, and the engine generates mutations of that code? This would truely be a real polymorphic engine and will polymorph everything, regardless of what it does. Take this for an example: MOV AX,3D02 INT 21 If you feed this to the generic polymorpher, you might get the following result: SUB AX,AX ADD AX,3000 CMP AX,78AF JE NEVER_JUMPS XOR AX,0D02 NEVER_JUMPS: INT 21 Or if you want to generate a decryptor, you can feed this to the polymorpher: MOV SI,OFFSET ENCRYPTED_VIRUS MOV AL,32 MOV CX,VIRUS_LENGTH DECRYPT_VIRUS: XOR BYTE PTR [SI],AL ADD AL,4 INC SI LOOP DECRYPT_VIRUS You might get this as a result: MOV SI,OFFSET ENCRYPTED_VIRUS+145 ADD SI,-145 MOV AL,33 DEC AX MOV CX,VIRUS_LENGTH XOR 1234 XOR CX,1234 DECRYPT_VIRUS: XCHG SI,DI XOR BYTE PTR [DI],AL XCHG SI,DI INC AL INC AL INC AL ADD AL,1 SUB SI,-1 DEC CX JNZ DECRYPT_VIRUS As you have noticed, the polymorpher only puts random instructions in the place where it could compose more compact instructions, it doesn't swap opcodes. This should be generated by a separate module, because a the polymorpher doesn't know what it is allowed to swap and what's not allowed to swap. To generate a decryptor, you must call two engines, like in the diagram shown: ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÚÄÄÄÄÄÄÄÄÄÄÄ¿ (1) >>Ä´OPCODE SCRAMBLERÃÄÄÄÄ>>ÄÄÄÄ´POLYMORPHERÃÄ>> (3) ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ (2) ÀÄÄÄÄÄÄÄÄÄÄÄÙ (1) Input parameters to generate a decryptor (2) Generic Decryptor (3) Polymorphic Generic Decryptor You can make both the opcode scrambler and the polymorpher as complex as you want. In it's most simple implementation, the polymorpher has a little drawback: since it polymorphs one opcode at a time, the random opcodes and not be mixed with random opcodes from the next operand. The advantage is that you don't need to track the registers, but it's polymorphic structure is still somewhat predictable. There are a few problems considering the polymorpher: þ Recalculate branch jump opcodes þ How to handle registers set to pointer þ How to fully mutate a virus? You must keep the original metavirus code, otherwise it would polymorph the polymorphed virus. þ How to set aside data from code while morphing? An approach to resolve the jump and register handling opcodes is making some sort of relocation table, as used in EXE files. If you want to polymorph a piece of program you feed the polymorpher the range of jumps it should adjust. You can put this on the stack while calling the engine, or setting some pointer to a predefined table, whichever approach you like most. Make sure you can relocate both 8 and 16 bits addresses, both direct or indirect. You can also generate a range table which must not be morphed and to which references should be updates (pointer registers). A relocation/exclusion/resolve table (RER table) can look like this: enum RER_types { RERT_nil, ; 0 - end of RER chain RERT_8rel, ; 1 - 8 bits relative address (conditional jumps) RERT_16rel, ; 2 - 16 bits relative address (call) RERT_16dir, ; 3 - 16 bits direct address (pointers & jumps) } struct RER_table { RER_type : unsigned char; RER_address : unsigned int; } After using this table on morphing the code you want, don't forget to update the table with the new addresses if you want to morph again the current result. You can, if programmed in a good style, call the morpher multiple times, and each time it will morph the routine specified. A bit harder is including the possibility to shrink a routine that was generated by a previous morph. To expand and add instructions that do the same thing is easier than shrink them into a compact instruction, as you need to know how a few instructions can be optimized into less instructions or a shorter variant. Some simple algorithms are possible, like changing an ADD ,1 into an INC or even more complicated things like this: Unoptimized Optimized CMC JC ERROR JNC ERROR CMC XOR AX,AX MOV AX,3D02 ADD AX,3D02 Maybe it's best to seperate the shrinker module too, so you first let the shrinker optimize the virus to what it thinks that is the shortest way, and next calling the morphing engine to enlarge it again. Both can use the same instruction table and RER table. You can also add an overlapping module that randomly calls both the shrinker and morpher, thus optimizing some parts of the virus while expanding other parts. Thus, the modules are like this hierarchy: ÚÄÄÄÄÄÄÄÄÄ¿ ³Scrambler³(1) ÀÄÄÄÄÂÄÄÄÄÙ ÚÄÄÄÁÄÄÄ¿ ³Mutator³(2) ÀÄÄÄÂÄÄÄÙ ÚÄÄÄÁÄÄÄ¿(3) ÚÄÄÄÄÄ´MorpherÃÄÄÄÄ¿ ÚÄÄÄÁÄÄÄÄ¿ÀÄÄÄÄÄÄÄÙÚÄÄÄÁÄÄÄÄ¿ (4)³Shrinker³ ³Expander³(5) ÀÄÄÄÄÄÄÄÄÙ ÀÄÄÄÂÄÄÄÄÙ ÚÄÄÄÁÄÄÄÄ¿ ³Garbage ³(6) ÀÄÄÄÂÄÄÄÄÙ ÚÄÄÄÁÄÄÄÄ¿ ³Trasher ³(7) ÀÄÄÄÂÄÄÄÄÙ ÚÄÄÄÁÄÄÄÄÄÄ¿ ³Randomizer³(8) ÀÄÄÄÄÄÄÄÄÄÄÙ (1) Will put instructions in a random order (2) Will choose other registers for the actions that must be done (3) Will call randomly the shrinker and expander to mutate the code (4) Shrinks code by optimizing instructions that it knows (5) Expands code by creating multiple random opcodes with the same functionality (6) Adds random do-nothing instructions (7) Adds plain garbage (random numbers) (8) Random number generator, must to able to do both slow-random and regular random (for slow and normal poly/mutating) Rajaat 29A, November '98