Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

How to detect what was the PE packer used on the given exe?

Tags:

exe

winapi

upx

I've found an application which seems to be packed. I opened it with some hex editor and it contains "UPX1" section and "3.00 UPX!" string. Unfortunately I'm not able to decompress it with upx latest, it says "not packed by UPX". Is there a way to find out what other PE compressors/crypters were used?

like image 238
migajek Avatar asked Aug 13 '09 12:08

migajek


3 Answers

PEiD is the tool you want. It can detect a variety of unpackers, attempt to unpack any packed exe (regardless of packing scheme), do simple disassembly, detect encryption algorithms present in the source code (not the encryption scheme of the exe, to be clear), and more. But primarily, it is an identifier of packers, cryptors, and compilers of an exe.

like image 154
erjiang Avatar answered Nov 30 '22 05:11

erjiang


In many cases, a packaged executable starts with the launch program, followed by a standard zip file. This is possible because the ZIP header is at the end of the file, so you can prepend arbitrary data to a zip file, and it remains to be a zipfile. So try unzipping it, and see whether that works.

like image 44
Martin v. Löwis Avatar answered Nov 30 '22 05:11

Martin v. Löwis


Development and Support of PEiD has been discontinued in April 2011 but it's still the best tool available for Packer detection.
you can also use ExeScan .it is available here

ExeScan

like image 42
AminM Avatar answered Nov 30 '22 04:11

AminM