PE program hiding method

The invention provides a hiding method for a PE program, and relates to the technical field of computer software security. The method comprises the following steps: generating three random secret keys a, b and c so as to correspondingly encrypt an exe program to be hidden, shellcode data of a PE loa...

Full description

Saved in:
Bibliographic Details
Main Authors CHEN HAOTING, CHEN YI'AN, WANG JUNFENG, LIU JINWEN, FANG ZHIYANG
Format Patent
LanguageChinese
English
Published 20.08.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention provides a hiding method for a PE program, and relates to the technical field of computer software security. The method comprises the following steps: generating three random secret keys a, b and c so as to correspondingly encrypt an exe program to be hidden, shellcode data of a PE loader and a corresponding sensitive character string, and generating first, second and third encrypted data; sequentially writing the secret key a and the first encrypted data, the secret key b and the second encrypted data, and the secret key c and the third encrypted data into a dataencrypt.h file, a PELoader. H file and a basicFuncNameencrypt.h file of a background; and calling a CL compiler and a LINK connector to compile and link the C language file, and generating a hidden exe program. According to the method, the suspicion degree of the exe program can be effectively reduced, the concealment of the exe program is improved, the implementation process is faster, the overhead is smaller, implementation is easy, a
Bibliography:Application Number: CN202410633541