Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Run Arbitrary Parsing Scripts on Binary Files #135

Open
jbussing opened this issue Sep 6, 2018 · 1 comment
Open

Run Arbitrary Parsing Scripts on Binary Files #135

jbussing opened this issue Sep 6, 2018 · 1 comment

Comments

@jbussing
Copy link
Collaborator

jbussing commented Sep 6, 2018

Background

Malware is often packed or encrypted using custom algorithms on specific sections within a dropper binary. It would be nice to arbitrarily specify extracting/unpacking/decrypting/decoding scripts against binaries scanned by Binary Alert.

~~ Case 1 ~~
It is common for python scripts to be compiled using pyinstaller or py2app to create a single binary executable for both MacOS and Windows platforms. Instead of writing signatures on the compiled code (which can often reduce signal strength), it would be nice to run code to decompile the binary and then run Yara signatures on the resulting files.

For example of scripts to be applied before the Yara scanning occurs, see the 2 unpacker/decompiler scripts here https://github.com/countercept/python-exe-unpacker.

Desired Change

Support for the addition of arbitrary code to be run against binaries before Yara scanning occurs. Ideally, this should be recursive as some malicious payloads can be packed more than one time.

@jbussing
Copy link
Collaborator Author

jbussing commented Sep 6, 2018

@austinbyers I wanted to tag you on this issue. Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant