Skip to content

Latest commit

 

History

History
executable file
·
137 lines (123 loc) · 4.49 KB

README.md

File metadata and controls

executable file
·
137 lines (123 loc) · 4.49 KB

tknk_scanner

The original code of a malware must be scanned using YARA rules after processing with a debugger (or other means) to account for obfuscated malware binaries. This is a complicated process and requires an extensive malware analysis environment. The tknk_scanner is a community-based integrated malware identification system, which aims to easily identify malware families by automating this process using an integration of open source community-based tools and freeware. The original malware code can be scanned with with your own YARA rules by submitting the malware in PE format to the scanner. tknk_scanner can thus support surface analysis performed by SOC operators, CSIRT members, and malware analysts.

tknk02

Features

  • Automatic identification and classification of malware
    • Scan the original code of malware with yara.
  • Dumps original code of malware
    • You can easily get the original code.
  • Community-based
    • Integrates multiple Open Source Software and free tools
  • User-friendly Web-UI
    • Users can submit malware and check scan results using the Web-UI.

Requirements

  • Ubuntu 18.04 (Host OS)
  • Windows10 (Guest OS)
  • python 3.5 or later
  • yara-python 3.7.0
  • qemu-kvm
  • nginx
  • Redis
  • MongoDB

Installation

Preparing the Host

  1. git clone --recursive repository_url
  2. sudo setup/setup.sh
  3. Edit tknk.conf
  • vm_name
    • Virtual Machine name
  • vm_url
    • URL of xmlrpc_server.py
    • e.g. http://192.168.122.2:8000/
  • virus_total
    • If VT use, set to 1
  • vt_key
    • Your VT API KEY
  1. Download Malware characterization tools
  • avclass
$ git submodule update
  • Detect It Easy
    • Download zip from https://ntinfo.biz/
    • Extract zip(Linux Ubuntu 64-bit(x64)) totknk_scanner/
    • Rename folder name die
  1. Download and copy dump tools to tools/
    hollows_hunter.exe
    pe-sieve.dll
    
    procdump.exe
    
    Scylla.dll
    
  2. Set yara rules
    Save yara rules in "rules" folder. You need to add the rule to index.yar.

Preparing the Guest

  1. Install Windows on KVM
  2. Turn off Windows Defender and Windows SmartScreen
  3. Install Python 3.6
  4. Set to the IP address described in vm_url.
  5. Copy and run xmlrpc_server.py (Recommend run script as Administrator)
  6. Make snapshot

Setting Web-UI

$ cd frontend/
$ npm install
$ npm run generate
$ mkdir /usr/share/nginx/tknk/
$ sudo cp -rf dist/* /usr/share/nginx/tknk/
$ cd ../
$ sudo cp -f tknk-scanner.nginx.conf /etc/nginx/sites-available/default
$ sudo systemctl restart nginx

Run

$ cd tknk_scanner/
$ ./tknk.py

At another terminal

$ cd tknk_scanner/
$ rq worker

Usage

tknk01

  • File upload
    Upload the file to be scanned.

  • time
    Sets the time to start runing dump tools. The default is 120 seconds.

  • mode

    • hollows_hunter
      Using hollows_hunter.
    • prodump
      Using procdump.
    • scylla
      Using Scylla.
    • diff(procdump)
      Dump the newly created process while running with procdump.

tknk03 tknk04

Demo

https://www.youtube.com/watch?v=_lXFYIT5Mzc

License

tknk_scanner is open-sourced software licensed under the MIT License

Credits