samsung-firmware-magic icon indicating copy to clipboard operation
samsung-firmware-magic copied to clipboard

Can not decode firmware for Evo 860

Open alex-bender opened this issue 3 years ago • 3 comments

Hello, I;ve tried to decode firmware for SSD EVO 860 but didn't manage to do so, could you please help? Here is the reproducible script:

#!/bin/env bash
set -x 
echo 'Go to /tmp dir'
cd /tmp
echo 'Download iso'
wget https://s3.ap-northeast-2.amazonaws.com/global.semi.static/SAMSUNG_SSD_860_EVO_200217/FW/F1EACA63909EC0059B675B9E5CDE3AA96C4A2D752FB6B7B27C8E0CC4025411BA/Samsung_SSD_860_EVO_RVT04B6Q_Win.iso
echo 'Extract initrd'
7z x Samsung_SSD_860_EVO_RVT04B6Q_Win.iso initrd
echo 'Extract initrd~'
7z x initrd
echo 'Extract root/fumagician'
7z -ofw x 'initrd~' root/fumagician
cd fw/root/fumagician
echo 'Download samsung-magic.py'
wget https://raw.githubusercontent.com/chrivers/samsung-firmware-magic/master/samsung-magic.py
echo 'Decode firmware'
python2 ./samsung-magic.py < DSRD.enc > DSRD.bin
hexdump -C DSRD.bin
echo -e '\n\n'
echo 'Decoding failed: file is binary'
file DSRD.bin

And also I have a question: what is the target arh of extracted binary? Thanks

alex-bender avatar Sep 07 '20 10:09 alex-bender

I can help with the second question:

/root/fumagician/fumagician: ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), statically linked, for GNU/Linux 2.6.32, BuildID[sha1]=3f9bb84ac00869d2c4404a9f7b4f0431db15633a, not stripped

marcosscriven avatar Mar 22 '21 06:03 marcosscriven

Sorry for the late reply.

I think this is similar to #4 - it looks like Samsung uses a variety of obfuscation techniques, and the existing version can only handle some of them. Patches welcome :)

chrivers avatar Apr 11 '21 13:04 chrivers

Where did you get IV and Key from?

alex-bender avatar Apr 11 '21 21:04 alex-bender