Closed msm-cert closed 6 months ago
Hey! :) Just stumbled upon this PR and wanted to share that recently I've been experimenting with dumps from emulation and came across (what I assume is) this behavior, same samples only difference being imagebase. I'll be happy to share hashes of such samples, if you need
It looks like it's not really b*100
but binary were not correctly carved and m
was pointing 100 times at the beginning of the buffer. I try to fix this in #122.
This solves our "problems" with binaries that are submitted as copies of themselves, like
b = open("x.exe").read(); b = b * 100
.This is not an elegant fix for many reasons:
.m
hash behave differently because of imagebase.It will hopefully stop us from OOMing, but it's not a critical fix.