Skip to main content

A library for extracting malware configurations across multiple frameworks

Project description

ConfigExtractor

Latest Stable Release License

Maintainer: @cccs-rs

Python Library for performing configuration extraction across multiple extraction frameworks (ie. Maco, MWCP, etc.). This tool is actively used in the Assemblyline project as a service.

The code found in this repository contains a command line interface that acts as a wrapper for popular malware configuration data decoders from:

Installation Guide

Running in a Container

docker container run \
  -v /path/to/parsers:/mnt/parsers \
  -v /path/to/samples:/mnt/samples \
  cccs/assemblyline-service-configextractor \
  "cx -p /mnt/parsers -s /mnt/samples"

Usage

Command-line

You can use configextractor or cx to make use of the CLI:

Usage: cx [OPTIONS] PARSERS_PATH SAMPLE_PATH

Options:
  --block_list TEXT  Comma-delimited list of parsers to ignore
  --help             Show this message and exit.

Python

from configextractor.main import ConfigExtractor
import logging

# Create a logger to track ongoings
logger = logging.getLogger()
logger.handlers = [logging.StreamHandler()]
logger.setLevel('DEBUG')

# Instantiate instance of class with path(s) to extractors
# Attaching a logger will allow some insight into what's going on if parser detection is the issue
cx = ConfigExtractor(["/path/to/extractors/"], logger=logger)

# List all parsers actively detected and loaded into instance
# cx.parsers.keys() lists all the relative module paths to the parsers
# The value of each key is an Extractor object containing details for running the extractor (ie. venv location, YARA rule, etc.)
print([cx.get_details(p)['name'] for p in cx.parsers.values()])

# Run all loaded parsers against sample
results = cx.run_parsers('/path/to/sample')

# Output raw results to stdout, each should be organized by the parsers that generated an output
print(results)

Adding a new Parser Framework

  1. Inherit from the base Framework class and implement class accordingly
  2. Add new framework to the ConfigExtractor class' FRAMEWORK_LIBRARY_MAPPING

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

configextractor_py-1.1.15.tar.gz (24.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

configextractor_py-1.1.15-py3-none-any.whl (26.4 kB view details)

Uploaded Python 3

File details

Details for the file configextractor_py-1.1.15.tar.gz.

File metadata

  • Download URL: configextractor_py-1.1.15.tar.gz
  • Upload date:
  • Size: 24.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.19

File hashes

Hashes for configextractor_py-1.1.15.tar.gz
Algorithm Hash digest
SHA256 dee599ff8b7099bce48e3052c0b7efe37a45963e62abf18d353825c734fea0e0
MD5 7e062b52e318f57945dfffdabc99b83f
BLAKE2b-256 e94ab712906bba6b8569a3016ee2f4eabb63ada0dbfa6cd601d2c006bca8c232

See more details on using hashes here.

File details

Details for the file configextractor_py-1.1.15-py3-none-any.whl.

File metadata

File hashes

Hashes for configextractor_py-1.1.15-py3-none-any.whl
Algorithm Hash digest
SHA256 4a25cd8242b8a2735a2b55794c462248e1ea91a5349f7533915498e95f56c825
MD5 88c2813de775538e478c6774b258b366
BLAKE2b-256 bc962aab4eca20278fd7cdd51ebbbd6fbc8a8eade01b28b545d11e19c6bd8158

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page