In recent years, there has been an increase in malware attacks employing Nuitka. However, there aren't many resources available online to deal with this issue. Hence, I decided to write this article to help bridge the knowledge gap and lack of tooling for Nuitka binaries.
Before diving into Nuitka, it would be beneficial to revisit the basics of Python reversing:
co_code
), however, gets erasedlibpython
and static C files of its own to execute in the same way as CPython does
python3XX.dll
as a dependencypip install nuitka
python -m nuitka <.py> [--onefile/--standalone]
--standalone
: outputs a directory containing the executable & its dependencies--onefile
: outputs a single binary that unpacks before executing
"%TEMP%/onefile_%PID%_%TIME%”
I will be using flake.exe
from Flare-On 10 to illustrate my analysis process. It is a stripped Nuitka binary that is compiled using the --onefile
flag.
‣ (DIE) works well.