Guardsquare / flutter-re-demo

Experiments on the feasibility of Flutter application reverse engineering
137 stars 36 forks source link

Some improvements on code analysis and usability. #4

Open chkp-alexandrsh opened 1 year ago

chkp-alexandrsh commented 1 year ago

While analyzing some malware sample we weren't able to find all references we need. After digging through source code of flutter-re-demo scripts we found way to improve parsing of assembler code and to increase usability, a little bit.

Here is full list of proposed changes: Add: parsing of some previously unsupported assembler constructions of accessing Dart objects through X27 (aarch64 only) Add: saving of key information during dynamic analysis and using saved information by IDA scripts (file _dumpinfo.json) Cng: one field for unknown Dart object struct is set to offset, it could bring more references