killchain-compendium/Forensics/Malware.md

39 lines
1.1 KiB
Markdown
Raw Normal View History

2022-12-12 20:03:55 +01:00
# Malware
## Tools
2023-02-14 21:05:04 +01:00
### Detect is Easy
* [Detect is Easy | DIE](https://github.com/horsicq/Detect-It-Easy)
* Analyze signatures with [capa](https://github.com/mandiant/capa) via
```sh
capa <binary>
```
2022-12-12 20:03:55 +01:00
* Unpack with `upx`
2023-02-14 21:05:04 +01:00
2022-12-12 20:03:55 +01:00
* Re-analyze after deleting the cache `del <binary>.viv`
2023-02-14 21:05:04 +01:00
### Strings
Tools for String searching and deobfuscations are
* [Floss](https://github.com/mandiant/flare-floss/)
### Lab Setup
* [REMnux](https://github.com/REMnux)
* [FlareVM for Windows](https://github.com/mandiant/flare-vm)
### Fuzzy Hashing
Splits the file into pieces and generates a hash from that to provide hashes of partial binaries.
This can be done via [ssdeep](https://ssdeep-project.github.io/ssdeep/index.html), maybe in recursive mode.
## Resources
* [MalAPI.io](https://malapi.io) provides an overview of functions used by malware
* [Extracting obfuscated strings](https://www.mandiant.com/resources/blog/automatically-extracting-obfuscated-strings)
* [Abuse's Bazaar](https://bazaar.abuse.ch)
* [Malware Behavior Catalog](https://github.com/MBCProject/mbc-markdown)