I recently came across a scenario where I suspect there might be executable files embedded within images. Specifically, these executables are designed for VAX and 68k architectures and may involve bit-blit operations and multiplexing/demultiplexing.

I'm looking for guidance on how to extract these embedded executables from the images. Could anyone recommend specific tools and techniques for accomplishing this task? Additionally, what considerations should I keep in mind while performing this extraction process?

Any insights or recommendations would be greatly appreciated. Thank you!Screenshot from 2024-03-17 21-20-31.png