Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature request: Support LZNT1 (de)compression used in Windows' RtlDecompressBuffer and NTFS #534

Open
joseph-hannon opened this issue Apr 4, 2019 · 2 comments · Fixed by #1675 or bee-san/CyberFork#43

Comments

@joseph-hannon
Copy link

Summary

On Windows malware will often compress embedded shellcode/payloads and then use RtlDecompressBuffer to decompress it, with LZNT1 decompression. NTFS also uses this compression method. Here is an example of a pure Python implementation.

@notdeclan
Copy link

Agreed this would be nice

bee-san pushed a commit to bee-san/CyberFork that referenced this issue Dec 27, 2023
Introduces support for LZNT1 decompression, commonly leveraged by malware through RtlDecompressBuffer (closes gchq#534).

The decompression logic is ported from go-ntfs, the test data is similar to malduck's.

from: gchq#1675
@a3957273
Copy link
Member

a3957273 commented Feb 3, 2024

Reopening as #1675 only handles decompression, whereas this ticket also requests compression.

@a3957273 a3957273 reopened this Feb 3, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
4 participants