Go to file
Alberto Ortega dfca26d827 Added v02 screenshots 2012-10-28 19:06:09 +01:00
pafish v02 uploaded! 2012-10-28 18:41:38 +01:00
screenshots Added v02 screenshots 2012-10-28 19:06:09 +01:00
CHANGELOG v02 uploaded! 2012-10-28 18:41:38 +01:00
README.md Added some develop information 2012-07-03 19:50:37 +02:00
pafish.exe v02 uploaded! 2012-10-28 18:41:38 +01:00

README.md

Pafish

(Paranoid Fish)

Pafish is a demo tool that performs some anti(debugger/VM/sandbox) tricks. Most of them are often used by malware to avoid debugging and dynamic analysis.

The project is open source, you can read the code of all anti-analysis checks. You can also download the compiled executable (or compile it by yourself) and reverse engineer it, which is quite recommended.

Scope

Note that the aim of the project is not to implement complex VM detections.

The objective of this project is to collect usual tricks seen in malware samples. In this way, we can study it, and test if our analysis environments are properly implemented.

Build

Pafish is written in C and developed with wxDev-C++.

Author

Alberto Ortega (@a0rtega - profile) - alberto[at]pentbox.net

Contributions

Feel free to send me malware samples or more tricks to add. GPG ID: 6A06CF5A