Supported packers for unpacking
Our engine can unpack a wide range of packers, both specific and generic. This is important because packers are often used by malware to evade detection. By unpacking them, we can analyze and identify any embedded threats.
Specifically supported packers:
- ASPack,
- FSG,
- MEW,
- MPRESS,
- PEiTe,
- UPX,
- YZPack.
The screenshot from the linked analysis shows the unpacked PE is available for download.
You can find the sample from the screenshot below at the following link:
The screenshot from the linked analysis shows the unpacked PE is available for download.

Additionally, we also support extraction and decompilation of scripting code that has be wrapped as an executable. This technique is commonly found in malware and can be effective to deviate the focus of the analysis from the relevant payload. Hence we detect, extract, and decompile such implementation in order to be able to focus on the relevant payload.
Supported compiled scripting languages:
- PyInstaller
- Py2Exe
- Nuitka
- AutoIT
- JPHP
On the following link you can find the sample from the screenshot below:
