mirror of
https://github.com/SabreTools/BinaryObjectScanner.git
synced 2026-02-11 05:35:15 +00:00
This change also removes a couple of things from `BurnOutSharp.Tools.Utilities` that are no longer needed there. Linear executables are included in the scanning classes. Update the guides accordingly.
42 lines
1.7 KiB
C#
42 lines
1.7 KiB
C#
using System.Collections.Generic;
|
|
using BinaryObjectScanner.Interfaces;
|
|
using BinaryObjectScanner.Matching;
|
|
using BinaryObjectScanner.Wrappers;
|
|
|
|
namespace BinaryObjectScanner.Protection
|
|
{
|
|
// TODO: Do more research into the Cucko protection:
|
|
// - Reference to `EASTL` and `EAStdC` are standard for EA products and does not indicate Cucko by itself
|
|
// - There's little information outside of PiD detection that actually knows about Cucko
|
|
// - Cucko is confirmed to, at least, use DMI checks.
|
|
public class Cucko : IPortableExecutableCheck
|
|
{
|
|
/// <inheritdoc/>
|
|
public string CheckPortableExecutable(string file, PortableExecutable pex, bool includeDebug)
|
|
{
|
|
// Get the sections from the executable, if possible
|
|
var sections = pex?.SectionTable;
|
|
if (sections == null)
|
|
return null;
|
|
|
|
// Get the .text section, if it exists
|
|
if (!pex.ContainsSection(".text"))
|
|
return null;
|
|
|
|
var matchers = new List<ContentMatchSet>
|
|
{
|
|
// Confirmed to detect most examples known of Cucko. The only known exception is the version of "TSLHost.dll" included on Redump entry 36119.
|
|
// ŠU‰8...…™...ŠUŠ8T...
|
|
new ContentMatchSet(new byte?[]
|
|
{
|
|
0x8A, 0x55, 0x89, 0x38, 0x14, 0x1E, 0x0F, 0x85,
|
|
0x99, 0x00, 0x00, 0x00, 0x8A, 0x55, 0x8A, 0x38,
|
|
0x54, 0x1E, 0x01, 0x0F
|
|
}, "Cucko (EA Custom)")
|
|
};
|
|
|
|
return MatchUtil.GetFirstMatch(file, pex.GetFirstSectionData(".text"), matchers, includeDebug);
|
|
}
|
|
}
|
|
}
|