All Projects → Youlor → unpacker

Youlor / unpacker

Licence: other
基于ART主动调用的脱壳机

Programming Languages

C++
36643 projects - #6 most used programming language
java
68154 projects - #9 most used programming language
assembly
5116 projects
HTML
75241 projects
AIDL
53 projects
c
50402 projects - #5 most used programming language

Labels

Projects that are alternatives of or similar to unpacker

gust tools
A set of utilities for dealing with Gust (Koei Tecmo) PC games files
Stars: ✭ 117 (-69.61%)
Mutual labels:  unpacker
homm3-unpacker
Parse HOMM3 game files
Stars: ✭ 23 (-94.03%)
Mutual labels:  unpacker
dmc unrar
A dependency-free, single-file FLOSS unrar library
Stars: ✭ 47 (-87.79%)
Mutual labels:  unpacker
mozitools
Mozi Botnet related tools helping to unpack a sample, decode a configuration and track active Mozi nodes using DHT.
Stars: ✭ 23 (-94.03%)
Mutual labels:  unpacker
RoAMer
Robust Automated Malware Unpacker
Stars: ✭ 72 (-81.3%)
Mutual labels:  unpacker
unbox
🎁 unbox - Unpack and Decompile the $h*! out of things
Stars: ✭ 39 (-89.87%)
Mutual labels:  unpacker
cstruct-go
a fast c-style struct packer & unpacker for golang
Stars: ✭ 28 (-92.73%)
Mutual labels:  unpacker
N-Gage stuff
Some N-Gage stuff for translation and modding
Stars: ✭ 21 (-94.55%)
Mutual labels:  unpacker
TML.Patcher
Console application for decompiling, recompiling, packaging, and patching tModLoader's .tmod files at blazing-fast speeds.
Stars: ✭ 38 (-90.13%)
Mutual labels:  unpacker
agsutils
contains utils for AGS: game extractor, repacker, disassembler and assembler
Stars: ✭ 30 (-92.21%)
Mutual labels:  unpacker
ISx
ISx is an InstallShield installer extractor
Stars: ✭ 79 (-79.48%)
Mutual labels:  unpacker
Detect It Easy
Program for determining types of files for Windows, Linux and MacOS.
Stars: ✭ 2,982 (+674.55%)
Mutual labels:  unpacker
source-map-unpack
Unpack 🛍 your JS source maps 🗺 to original files and folders.
Stars: ✭ 115 (-70.13%)
Mutual labels:  unpacker
.NetReactorStringDecryptor
A string decryptor for .NET Reactor.
Stars: ✭ 20 (-94.81%)
Mutual labels:  unpacker
Unpackers
My collection of unpackers for malware packers/crypters
Stars: ✭ 25 (-93.51%)
Mutual labels:  unpacker
.NetReactorCfCleaner
A control flow cleaner for .NET Reactor.
Stars: ✭ 42 (-89.09%)
Mutual labels:  unpacker
PboViewer
Cross-platform PBO maker / unpacker
Stars: ✭ 28 (-92.73%)
Mutual labels:  unpacker
Unity-Studio
UnityStudio Stable版本分支,支持U3D 5.x。
Stars: ✭ 33 (-91.43%)
Mutual labels:  unpacker
CTR-tools
Crash Team Racing (PS1) tools - a C# framework by DCxDemo and a set of tools to parse files found in the original kart racing game by Naughty Dog.
Stars: ✭ 93 (-75.84%)
Mutual labels:  unpacker
npk-tools
Mikrotik's NPK files managing tools
Stars: ✭ 63 (-83.64%)
Mutual labels:  unpacker

Youpk

又一款基于ART的主动调用的脱壳机

原理

Youpk是一款针对Dex整体加固+各式各样的Dex抽取的脱壳机

基本流程如下:

  1. 从内存中dump DEX
  2. 构造完整调用链, 主动调用所有方法并dump CodeItem
  3. 合并 DEX, CodeItem

从内存中dump DEX

DEX文件在art虚拟机中使用DexFile对象表示, 而ClassLinker中引用了这些对象, 因此可以采用从ClassLinker中遍历DexFile对象并dump的方式来获取.

//unpacker.cc
std::list<const DexFile*> Unpacker::getDexFiles() {
  std::list<const DexFile*> dex_files;
  Thread* const self = Thread::Current();
  ClassLinker* class_linker = Runtime::Current()->GetClassLinker();
  ReaderMutexLock mu(self, *class_linker->DexLock());
  const std::list<ClassLinker::DexCacheData>& dex_caches = class_linker->GetDexCachesData();
  for (auto it = dex_caches.begin(); it != dex_caches.end(); ++it) {
    ClassLinker::DexCacheData data = *it;
    const DexFile* dex_file = data.dex_file;
    dex_files.push_back(dex_file);
  }
  return dex_files;
}

另外, 为了避免dex做任何形式的优化影响dump下来的dex文件, 在dex2oat中设置 CompilerFilter 为仅验证

//dex2oat.cc
compiler_options_->SetCompilerFilter(CompilerFilter::kVerifyAtRuntime);

构造完整调用链, 主动调用所有方法

  1. 创建脱壳线程

    //unpacker.java
    public static void unpack() {
        if (Unpacker.unpackerThread != null) {
            return;
        }
    
        //开启线程调用
        Unpacker.unpackerThread = new Thread() {
            @Override public void run() {
                while (true) {
                    try {
                        Thread.sleep(UNPACK_INTERVAL);
                    }
                    catch (InterruptedException e) {
                        e.printStackTrace();
                    }
                    if (shouldUnpack()) {
                        Unpacker.unpackNative();
                    }   
                }
            }
        };
        Unpacker.unpackerThread.start();
    }
  2. 在脱壳线程中遍历DexFile的所有ClassDef

    //unpacker.cc
    for (; class_idx < dex_file->NumClassDefs(); class_idx++) {
  3. 解析并初始化Class

    //unpacker.cc
    mirror::Class* klass = class_linker->ResolveType(*dex_file, dex_file->GetClassDef(class_idx).class_idx_, h_dex_cache, h_class_loader);
    StackHandleScope<1> hs2(self);
    Handle<mirror::Class> h_class(hs2.NewHandle(klass));
    bool suc = class_linker->EnsureInitialized(self, h_class, true, true);
  4. 主动调用Class的所有Method, 并修改ArtMethod::Invoke使其强制走switch型解释器

    //unpacker.cc
    uint32_t args_size = (uint32_t)ArtMethod::NumArgRegisters(method->GetShorty());
    if (!method->IsStatic()) {
        args_size += 1;
    }
    
    JValue result;
    std::vector<uint32_t> args(args_size, 0);
    if (!method->IsStatic()) {
        mirror::Object* thiz = klass->AllocObject(self);
        args[0] = StackReference<mirror::Object>::FromMirrorPtr(thiz).AsVRegValue();  
    }
    method->Invoke(self, args.data(), args_size, &result, method->GetShorty());
    
    //art_method.cc
    if (UNLIKELY(!runtime->IsStarted() || Dbg::IsForcedInterpreterNeededForCalling(self, this) 
    || (Unpacker::isFakeInvoke(self, this) && !this->IsNative()))) {
    if (IsStatic()) {
    art::interpreter::EnterInterpreterFromInvoke(
    self, this, nullptr, args, result, /*stay_in_interpreter*/ true);
    } else {
    mirror::Object* receiver =
    reinterpret_cast<StackReference<mirror::Object>*>(&args[0])->AsMirrorPtr();
    art::interpreter::EnterInterpreterFromInvoke(
    self, this, receiver, args + 1, result, /*stay_in_interpreter*/ true);
    }
    }
    
    //interpreter.cc
    static constexpr InterpreterImplKind kInterpreterImplKind = kSwitchImplKind;
  5. 在解释器中插桩, 在每条指令执行前设置回调

    //interpreter_switch_impl.cc
    // Code to run before each dex instruction.
      #define PREAMBLE()                                                                 \
      do {                                                                               \
        inst_count++;                                                                    \
        bool dumped = Unpacker::beforeInstructionExecute(self, shadow_frame.GetMethod(), \
                                                         dex_pc, inst_count);            \
        if (dumped) {                                                                    \
          return JValue();                                                               \
        }                                                                                \
        if (UNLIKELY(instrumentation->HasDexPcListeners())) {                            \
          instrumentation->DexPcMovedEvent(self, shadow_frame.GetThisObject(code_item->ins_size_),  shadow_frame.GetMethod(), dex_pc);            						   										   \
        }                                                                                \
      } while (false)
  6. 在回调中做针对性的CodeItem的dump, 这里仅仅是简单的示例了直接dump, 实际上, 针对某些厂商的抽取, 可以真正的执行几条指令等待CodeItem解密后再dump

    //unpacker.cc
    bool Unpacker::beforeInstructionExecute(Thread *self, ArtMethod *method, uint32_t dex_pc, int inst_count) {
      if (Unpacker::isFakeInvoke(self, method)) {
      	Unpacker::dumpMethod(method);
        return true;
      }
      return false;
    }

合并 DEX, CodeItem

将dump下来的CodeItem填充到DEX的相应位置中即可. 主要是基于google dx工具修改.

参考链接

FUPK3: https://bbs.pediy.com/thread-246117.htm

FART: https://bbs.pediy.com/thread-252630.htm

刷机

  1. 仅支持pixel 1代
  2. 重启至bootloader: adb reboot bootloader
  3. 解压 Youpk_sailfish.zip 并双击 flash-all.bat

编译

脱壳机源码编译

  1. 下载android-7.1.2_r33完整源码
  2. 替换unpacker/android-7.1.2_r33
  3. 编译

修复工具编译

  1. IDEA导入dexfixer项目
  2. main class为 com.android.dx.unpacker.DexFixer

使用方法

  1. 该工具仅仅用来学习交流, 请勿用于非法用途, 否则后果自付!

  2. 配置待脱壳的app包名, 准确来讲是进程名称

    adb shell "echo cn.youlor.mydemo >> /data/local/tmp/unpacker.config"
  3. 如果apk没有整体加固, 未避免installd调用dex2oat优化, 需要在安装之前执行第2步

  4. 启动apk等待脱壳 每隔10秒将自动重新脱壳(已完全dump的dex将被忽略), 当日志打印unpack end时脱壳完成

  5. pull出dump文件, dump文件路径为 /data/data/包名/unpacker

    adb pull /data/data/cn.youlor.mydemo/unpacker
  6. 调用修复工具 dexfixer.jar, 两个参数, 第一个为dump文件目录(必须为有效路径), 第二个为重组后的DEX目录(不存在将会创建)

    java -jar dexfixer.jar /path/to/unpacker /path/to/output

适用场景

  1. 整体加固
  2. 抽取:

常见问题

  1. dump中途退出或卡死,重新启动进程,再次等待脱壳即可
  2. 当前仅支持被壳保护的dex, 不支持App动态加载的dex/jar
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].