(Please see the Chinese version here)
Tencent’s open source incentive program encourages developers’ participation and contributions, and looks forward to your joining.
HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis and security assessment on the Linux system. The tool help security analyze extracting the static and dynamic features from malware effectively and efficiently. The generated report provides significant information about process, file I/O, network and system calls.
The tool can be used for the static and dynamic analysis of ELF files on the Linux x86/x64 platform.
The tool will run on the VirtualBox 5.1 with Ubuntu 14.04 LTS.
in order to install thrid party software, please execute the following command after obtaining the code:
root# cd ./util/update_image
root# bash update_image.shgit clone https://github.com/Tencent/HaboMalHunter.gitFirstly, please upload the source code into the VM. Execute the following command with root permission under the /root directory.
cp -ra /media/sf_Source/ * .The command will compile and package the source code, and then will generate two zip files.
bash package.sh using ./test/bin/read.32.elf to make a test. The second command will copy report and log outside the VM.
python AnalyzeControl.py -v -l ./test/bin/read.32.elf
cp ./log/output.zip /media/sf_Source/
Among the result, output.static is static analysis result, output.dynamic is dynamic analysis result, and system.log is runtime log. Users can also upload samples to the Habo Malware Analysis System (https://habo.qq.com) to get a brief report.
HaboMalHunter is an open source sub-project of the Hubble Analysis System (https://habo.qq.com), an open source tool for automated analysis and file security detection under the Linux platform. Using this tool can help security analysts to obtain static and dynamic behavior characteristics of malicious samples in a concise and efficient manner. The analysis report provides key information such as processes, files, networks and system calls.
Open source code supports automated static dynamic analysis of ELF files on Linux x86/x64 platforms.
Using Hubble Linux open source version for virus analysis requires first creating a virtual machine environment for running viruses. Never run and analyze viruses directly in real environments. The project uses VirtualBox 5.1 to run Ubuntu 14.04 LTS as the analytical environment by default.
Install relevant software and obtain the source code, please run the following command as root in the virtual machine:
root# cd ./util/update_image
root# bash update_image.shUse git tools to get the source code.
git clone https://github.com/Tencent/HaboMalHunter.gitMost of the source code is python, and some of the C code needs to be compiled and packaged. First upload the code to the virtual machine. Use root identity and use commands in the /root/ directory, as shown in the figure:
cp -ra /media/sf_Source/ * .Run the command, compile and package, and output two files, AnalyzeControl_1129.zip and test_1129.zip, as shown in the figure:
bash package.shThis time, we used the test file ./test/bin/read.32.elf for testing. Use the following command: The second command will copy the analysis results outside the virtual machine and be used by analysts to read.
python AnalyzeControl.py -v -l ./test/bin/read.32.elf
cp ./log/output.zip /media/sf_Source/
In the analysis results, output.static is the static analysis result, output.dynamic is the dynamic analysis result, and system.log is the runtime log. At the same time, sample analysis can also be performed in combination with the results display in the Hubble Analysis System (https://habo.qq.com).