Che237's picture
Upload cryptomining_detection dataset
8377638 verified
# Detecting Remcos for Volatility
#
# LICENSE
# Please refer to the LICENSE.txt in the https://github.com/JPCERTCC/MalConfScan/
#
# How to use:
# 1. cd "Volatility Folder"
# 2. mv remcosscan.py volatility/plugins/malware
# 3. python vol.py remcosconfig -f images.mem --profile=Win7SP1x64
import volatility.plugins.taskmods as taskmods
import volatility.win32.tasks as tasks
import volatility.utils as utils
import volatility.debug as debug
import volatility.plugins.malware.malfind as malfind
import re
import pefile
from struct import unpack, unpack_from
from socket import inet_ntoa
from collections import OrderedDict
try:
import yara
has_yara = True
except ImportError:
has_yara = False
remcos_sig = {
'namespace1' : 'rule Remcos { \
strings: \
$remcos = "Remcos" ascii fullword \
$url1 = "Breaking-Security.Net" ascii fullword \
$url2 = "BreakingSecurity.Net" ascii fullword \
$resource = "SETTINGS" ascii wide fullword \
condition: 1 of ($url*) and $remcos and $resource}'
}
# MZ Header
MZ_HEADER = b"\x4D\x5A\x90\x00"
# Resource pattern
RESOURCE_PATTERNS = [re.compile("\xE0\x00\x00\x07\xE0\x00\x00\x07\xFF\xFF\xFF\xFF", re.DOTALL)]
# Flag
FLAG = {"\x00": "Disable", "\x01": "Enable"}
idx_list = {
0: "Host:Port:Password",
1: "Assigned name",
2: "Connect interval",
3: "Install flag",
4: "Setup HKCU\\Run",
5: "Setup HKLM\\Run",
6: "Setup HKLM\\Explorer\\Run",
7: "Setup HKLM\\Winlogon\\Shell",
8: "Setup HKLM\\Winlogon\\Userinit",
9: "Install path",
10: "Copy file",
11: "Startup value",
12: "Hide file",
13: "Unknown13",
14: "Mutex",
15: "Keylog flag",
16: "Keylog path",
17: "Keylog file",
18: "Keylog crypt",
19: "Hide keylog file",
20: "Screenshot flag",
21: "Screenshot time",
22: "Take Screenshot option",
23: "Take screenshot title",
24: "Take screenshot time",
25: "Screenshot path",
26: "Screenshot file",
27: "Screenshot crypt",
28: "Mouse option",
29: "Unknown29",
30: "Delete file",
31: "Unknown31",
32: "Unknown32",
33: "Unknown33",
34: "Unknown34",
35: "Unknown35",
36: "Audio record time",
37: "Audio path",
38: "Audio folder",
39: "Unknown39",
40: "Unknown40",
41: "Connect delay",
42: "Unknown42",
43: "Unknown43",
44: "Unknown44",
45: "Unknown45",
46: "Unknown46",
47: "Unknown47",
48: "Copy folder",
49: "Keylog folder",
50: "Unknown50",
51: "Unknown51",
52: "Unknown52",
53: "Unknown53",
54: "Keylog file max size",
55: "Unknown55",
}
setup_list = {
0: "Temp",
2: "Root",
3: "Windows",
4: "System32",
5: "Program Files",
6: "AppData",
7: "User Profile",
8: "Application path",
}
class remcosConfig(taskmods.DllList):
"""Parse the Remcos configuration"""
@staticmethod
def is_valid_profile(profile):
return (profile.metadata.get('os', 'unknown') == 'windows'), profile.metadata.get('memory_model', '32bit')
def get_vad_base(self, task, address):
for vad in task.VadRoot.traverse():
if address >= vad.Start and address < vad.End:
return vad.Start, vad.End
return None
# RC4
def rc4(self, data, key):
x = 0
box = range(256)
for i in range(256):
x = (x + box[i] + ord(key[i % len(key)])) % 256
box[i], box[x] = box[x], box[i]
x = 0
y = 0
out = []
for char in data:
x = (x + 1) % 256
y = (y + box[x]) % 256
box[x], box[y] = box[y], box[x]
out.append(chr(ord(char) ^ box[(box[x] + box[y]) % 256]))
return ''.join(out)
def parse_config(self, data):
p_data = OrderedDict()
key_len = ord(data[0])
key = data[1:key_len + 1]
enc_data = data[key_len + 1:]
config = self.rc4(enc_data, key)
#configs = config.split("@@")
configs = re.split("\x1E|@@", config)
for i, cont in enumerate(configs):
if cont == "\x00" or cont == "\x01":
p_data[idx_list[i]] = FLAG[cont]
else:
if i in [9, 16, 25, 37]:
p_data[idx_list[i]] = setup_list[int(cont)]
else:
p_data[idx_list[i]] = cont
return p_data
def calculate(self):
if not has_yara:
debug.error("Yara must be installed for this plugin")
addr_space = utils.load_as(self._config)
os, memory_model = self.is_valid_profile(addr_space.profile)
if not os:
debug.error("This command does not support the selected profile.")
rules = yara.compile(sources=remcos_sig)
for task in self.filter_tasks(tasks.pslist(addr_space)):
scanner = malfind.VadYaraScanner(task=task, rules=rules)
for hit, address in scanner.scan():
vad_base_addr, end = self.get_vad_base(task, address)
proc_addr_space = task.get_process_address_space()
data = proc_addr_space.zread(vad_base_addr, end - vad_base_addr)
config_data = []
# resource PE search
dll_index = data.rfind(MZ_HEADER)
dll_data = data[dll_index:]
try:
pe = pefile.PE(data=dll_data)
except:
outfd.write("[!] Can't mapped PE.\n")
continue
rc_data = ""
for idx in pe.DIRECTORY_ENTRY_RESOURCE.entries:
for entry in idx.directory.entries:
if str(entry.name) in "SETTINGS":
try:
data_rva = entry.directory.entries[0].data.struct.OffsetToData
size = entry.directory.entries[0].data.struct.Size
rc_data = dll_data[data_rva:data_rva + size]
print("[*] Found SETTINGS resource.")
except:
debug.error("Faild to load SETTINGS resource.")
if not len(rc_data):
for pattern in RESOURCE_PATTERNS:
mc = re.search(pattern, dll_data)
if mc:
try:
config_end = mc.end() + 1
while dll_data[config_end:config_end + 2] != "\x00\x00":
config_end += 1
rc_data = dll_data[mc.end():config_end - 1]
except:
debug.error("Remcos resource not found.")
config_data.append(self.parse_config(rc_data))
yield task, vad_base_addr, end, hit, memory_model, config_data
break
def render_text(self, outfd, data):
delim = '-' * 70
for task, start, end, malname, memory_model, config_data in data:
outfd.write("{0}\n".format(delim))
outfd.write("Process: {0} ({1})\n\n".format(task.ImageFileName, task.UniqueProcessId))
outfd.write("[Config Info]\n")
for p_data in config_data:
for id, param in p_data.items():
outfd.write("{0:<16}: {1}\n".format(id, param))