feat: Code improvements, new obfuscation options, and initial junk code insertion logic

- Some parts of the code have been organized.
- A new obfuscation option to encrypt the obfuscated code is now available.
- The foundation for junk code insertion has been implemented.
This commit is contained in:
keowu
2025-06-08 12:04:43 -03:00
parent 21cd08a327
commit 2c1bcbe4fe
5 changed files with 29 additions and 15 deletions

View File

@@ -9,6 +9,7 @@ public:
bool m_isIatObfuscation; //Process IAT Obfuscation
bool m_isJunkCode; // Insert junk code to confuse
bool m_isIgnoreOriginalCodeRemove; // Do not remove the original code after processing (replace the original instructions with NOPs)
bool m_isEncryptObfuscatedCode; // The user wants to encrypt all obfuscated code to avoid detection
std::vector<std::string> m_strProceduresToObfuscate; // Names of the procedures to obfuscate
// todo: passes

View File

@@ -179,6 +179,9 @@ bool Ryujin::run(const RyujinObfuscatorConfig& config) {
}
// Encrypt all obfuscated code
if (config.m_isEncryptObfuscatedCode) todoAction();
//Process new opcodes
peSections.ProcessOpcodesNewSection(opcodesWithRelocsFixed);

View File

@@ -84,15 +84,12 @@ void RyujinObfuscationCore::addPaddingSpaces() {
std::vector<ZyanU8> new_opcodes;
for (auto individual_opcode : opcode) {
for (auto individual_opcode : opcode)
new_opcodes.push_back(individual_opcode);
}
new_instructions.push_back(new_opcodes);
//Inserindo junkcode
//Storing Nop-Spacing
std::vector<ZyanU8> gen_opcodes;
asmjit::CodeHolder code;
@@ -104,12 +101,10 @@ void RyujinObfuscationCore::addPaddingSpaces() {
code.flatten();
auto section = code.sectionById(0);
const uint8_t* buf = section->buffer().data();
size_t size = section->buffer().size();
const auto buf = section->buffer().data();
auto size = section->buffer().size();
for (size_t i = 0; i < size; ++i) {
gen_opcodes.push_back(buf[i]);
}
for (auto i = 0; i < size; ++i) gen_opcodes.push_back(buf[i]);
new_instructions.push_back(gen_opcodes);
@@ -144,12 +139,12 @@ void RyujinObfuscationCore::obfuscateIat() {
auto data = opcode.data();
auto size = opcode.size();
if (data[0] == uopcode) { //0xFF ?
if (data[0] == uopcode) //0xFF ?
if (std::memcmp(&*(data + 2), &value, sizeof(uint32_t)) == 0) // Is it the same memory immediate?
return std::make_pair(block_id, opcode_id);
}
opcode_id++;
@@ -159,7 +154,7 @@ void RyujinObfuscationCore::obfuscateIat() {
}
return std::make_pair(-1, -1);
};
};
for (auto& block : m_obfuscated_bb) {
@@ -270,6 +265,10 @@ void RyujinObfuscationCore::obfuscateIat() {
return;
}
void RyujinObfuscationCore::insertJunkCode() {
// TODO
}
void RyujinObfuscationCore::updateBasicBlocksContext() {
auto new_obfuscated_opcodes = getProcessedProc().getUpdateOpcodes();
@@ -297,9 +296,18 @@ BOOL RyujinObfuscationCore::Run() {
}
if (m_config.m_isJunkCode) {
//First let's insert junk code
insertJunkCode();
//Update our basic blocks context to rely 1-1 for the new obfuscated opcodes.
this->updateBasicBlocksContext();
}
/*
if (config.m_isJunkCode) todoAction();
if (config.m_isVirtualized) todoAction();
if (m_config.m_isVirtualized) todoAction();
*/
return TRUE;

View File

@@ -26,6 +26,7 @@ private:
void updateBasicBlocksContext();
void addPaddingSpaces();
void obfuscateIat();
void insertJunkCode();
std::vector<uint8_t> fix_branch_near_far_short(uint8_t original_opcode, uint64_t jmp_address, uint64_t target_address);
uint32_t findOpcodeOffset(const uint8_t* data, size_t dataSize, const void* opcode, size_t opcodeSize);

View File

@@ -15,6 +15,7 @@ auto main() -> int {
config.m_isRandomSection = FALSE;
config.m_isVirtualized = FALSE;
config.m_isIatObfuscation = TRUE;
config.m_isEncryptObfuscatedCode = FALSE;
std::vector<std::string> procsToObfuscate{
"main",
"invoke_main",