This small tutorial demonstrates how to use IDC to decrypt part of a program at analysis time. The sample file is a portion of the Ripper virus.
The binary image of the virus is loaded into IDA and analysis is started at the entry point
Obviously, the bytes right after the call don’t make sense, but the call gives us a clue: it is a decryption routine.
We create a small IDC program that mimicks the decryption routine.
Save it on disk and press F2 to load it into IDA's interpreter.
Then, we press shift-F2 to call it with the appropriate values. Please note the linear address used for the starting point. Pressing OK executes the statement.
The bytes are now decrypted
We move the cursor to offset 0x50 and press C to inform IDA that there is now code at that location.
And the code to allocate memory for the virus appears, along with a rather impolite message... The analysis may now resume.