Ghidra fails to parse packed/mangled PE file that runs on Windows #2858
Comments
|
The license with which the file is distributed explicitly disallows copying, reverse-engineering (in this context: mostly mentioning the results of it) and redistributing; the issue attachment(s) are a violation of the license. link |
|
Reverse engineering is often explicitly permitted in laws of various countries, including mine, and any attempt by a license to restrict said rights are considered void. See section 52(1)(ac) of the Indian Copyright Act, for instance, which permits:
I have removed the attachment and replaced it with a link to VirusTotal. |
|
The PE optional header is only 8 bytes, which Ghidra can't handle. When that is fixed (and possibly other parsing issues), the best Ghidra will be able to show is just the header, since there are no sections defined. There is probably unpacking code in the header tho. |
Describe the bug
GHIDRA currently fails to parse a PE file that executes on Windows. The file itself appears mangled/packed.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
File parses correctly and Ghidra loads.
Screenshots
N/A.
Attachments
https://www.virustotal.com/gui/file/682ecf2ed4d7a4112e73b8dc7313e5d872a77d74b8e9f22a90d6879f4f6ca78c/detection (Note, removed attachment on owner's request.)
Environment (please complete the following information):
The text was updated successfully, but these errors were encountered: