AV Sniper is a tool to strip and check binary string.
Project description
AV Sniper
Motivation
In terms of end point protection generally we have 2 big categories:
- Static Analysis: The AV products has hashes and patterns rules to identify a threat.
- Dynamic Analysis: The AV products try to understand the application behavior to identify a threat.
The focus of this study and tool is the first approach, where the AV flag the application as malicious without needs to run, in other words, just in fact to save the EXE at the disk, the AV catch them. So, the motivation to create this tool is have an instrumentation to identify in a quick way what is the string (or set of strings) that is making the application flagged to the AV.
General functions
The tool was designed to follow these actions:
- Parse Windows Portable Executable (aka PE) generally an EXE file.
- Identify if the PE is a native application developed in C, C++ and so on, or if is a .NET application.
- List all existing string in the file.
- Create several PE files to be checked by AV.
- Verify which PE file was flagged as malicious by AV.
General flow
The general functions are executed according to the flow bellow:
- Parse Windows Portable Executable (aka
PE
) - Identify if the PE is a
native application
developed in C, C++ and so on, or if is a.NET application
. - List and store at the Database file all identified strings using the following encodings (
ASCII
,UTF-8
,UTF-16 BE
,UTF-16 LE
,UTF-32 BE
,UTF-32 LE
) - Save several PE (exe) files using 3 different strategies (according to the list below). Each file is related to one String at the database (identified at the step above)
- Unique: Just one original string is kept at the file, all other strings are replaced by random strings
- Incremental: The strings are being put at the file one-by-one
- Sliced: Just a range of 30 strings is kept at the file, all other strings are replaced by random strings.
- At the protected machine (test machine with AV), check each generated file (by the step above) if it has flagged as malicious. As each file is related to a string, flag this string as blacklisted.
- At this point we return to step 4, but if has a blacklisted string at the database, the step for will not put back this string at the PE file, instead that, a random string will be put.
Installation
pip3 install --upgrade avsniper
Documentation
Follow the detailed documentation
- How does it works
- Understanding strip strategies
- How to use
- How to use - Remote commands
- Building
- Windows Http Server Module
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file avsniper-0.1.0.tar.gz
.
File metadata
- Download URL: avsniper-0.1.0.tar.gz
- Upload date:
- Size: 631.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.12.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 7c557fd3124738e11efadff1f0a6d6e9e7ee3620e5e2cb56ab746b972d0a0bda |
|
MD5 | f12056dfcf6656711cf4b898dd5ae6b7 |
|
BLAKE2b-256 | 8d61301e3769cb0497ecc0776f502600977cf0518f554d1e8a2f6dc320f2f7d3 |