Malware analysis is like defusing bombs. The objective is to disassemble and understand a program that was built to do harm, which, is often obfuscated (ie: packed) to make the analysis more complicated.
Incarcero is a tool that creates Virtual Machines (VMs) preconfigured with malware analysis tools and security settings tailored for malware analysis without any user interaction.
Additionally, this repository also includes probably the largest malware source code collection as well as a module allowing one to download malware samples sourcing from popular online databases.
Note: Binaries with a generic names such as MD5 value or smbXXX.tmp were not detected as malware by VirusTotal at the moment of the upload, but this doesn't mean it's not a malware sample. Please feel free to setup, analyze and perform reverse engineering any and all of the samples in this repository, if you actually do, let me know the results of your investigation.
- Python 3.3+
- Packer
- Vagrant
- VirtualBox or an vSphere / ESXi server
- At least 5 GB of RAM
- VT-X extensions strongly recommended
dnf install ruby-devel gcc-c++ zlib-devel
vagrant plugin install winrm winrm-fs
apt install vagrant git python3-pip
apt install git python3-pip
pacman -Sy vagrant packer python-pip git
- Install git and packer using your distribution's packaging tool (packer is sometimes called packer-io)
- Install vagrant from their website : https://www.vagrantup.com/downloads.html (Installing from some distributions' packaging tools have caused issues).
- Install incarcero:
sudo pip3 install git+https://github.com/0x48piraj/incarcero.git#egg=incarcero
NOTE: Starting with Windows 10 Hyper-V is always running below the operating
system. Since VT-X needs to be operated exclusively by only one Hypervisor, causes VirtualBox (and
incarcero) to fail. To disable Hyper-V and allow
VirtualBox to run, issue the following command in an administrative command
prompt then reboot: bcdedit /set hypervisorlaunchtype off
. Since version 6 of Virtualbox
it supports using Hyper-V as the fallback execution core (changelog)
The following steps assume that you have https://chocolatey.org/[Chocolatey] installed. Otherwise, follow the manual installation procedure.
Install dependencies:
choco install python vagrant packer git virtualbox
Refresh the console:
refreshenv
Install incarcero:
pip3 install setuptools
pip3 install -U git+https://github.com/0x48piraj/incarcero.git#egg=incarcero
- Install VirtualBox, Vagrant and git
- Install Packer, drop the packer binary
in a folder in your user's PATH like
C:\Windows\System32\
- Install Python 3 (make sure to add Python to your environment variables)
- Open a console (Windows-Key + cmd)
pip3 install setuptools
pip3 install -U git+https://github.com/0x48piraj/incarcero.git#egg=incarcero
Run this command after normal installation:
vagrant plugin install vagrant-aws
NOTE: The AWS feature has only been tested on Linux for the moment and EC2 does not support 32-bit desktop version of Windows 10.
This creates your base box that is imported in Vagrant. Afterwards you can re-use the same box several times per sample analysis.
Run:
incarcero build <template>
You can also list all supported templates with:
incarcero list
This will build a Vagrant box ready for malware investigation you can now include it in a Vagrantfile afterwards.
For example:
incarcero build win10_x64_analyst
The configuration section contains further information about what can be configured with incarcero.
incarcero spin win10_x64_analyst <name>
This will create a Vagrantfile
prepared to use for malware analysis. Move it
into a directory of your choice and issue:
vagrant up
By default the local directory will be shared in the VM on the Desktop. This
can be changed by commenting the relevant part of the Vagrantfile
.
For example:
incarcero spin win7_x86_analyst 20160519.cryptolocker.xyz
incarcero can upload and interact with a VM on the Amazon Web serivces. To do so, follow these steps:
. incarcero will need a S3 bucket on AWS to upload the VM before converting it to an AMI (Amazon Machine Image). If you don't have one, create one now.
. Your instance also requires a security group with at least a rule allowing inbound connections for WinRM (Type: WinRM-HTTP, Protocol: TCP, Port Range: 5985, Source: host's public IP).
. Next, you need a vmimport
service role configured.
Follow the section named VM Import Service Role of this guide.
These steps must be performed with an account that has iam:CreateRole
and iam:PutRolePolicy
permissions.
. If the default config is used, change the hypervisor to aws and fill the mandatory options related. Otherwise, be sure to add all the options about AWS to your custom config.
. Finally, you can follow the same steps described in the Box creation and the Per analysis instances sections to launch your instance!
NOTE: The AMI import can take a very long time (about an hour), however you can verify the status of the task by doing this. At the moment, only one AMI can be build per template.
Install awscli using pip:
pip install awscli
Configure awscli with:
aws configure
Then run:
aws ec2 describe-import-image-tasks
To connect to an instance on the cloud using RDP, run this command at the same location of your Vagrantfile
:
vagrant rdp -- /cert-ignore
For this to work, the instance will require a security group allowing RDP inbound connections (Type: RDP, Protocol: TCP, Port Range: 3389, Source: host's public IP).
NOTE: You can safely ignore the following error because rsync is not yet implemented: No host IP was given to the Vagrant core NFS helper. This is an internal error that should be reported as a bug.
To stop an instance on the cloud, run this command at the same location of your Vagrantfile
:
vagrant halt
incarcero' configuration is located in a directory that follows usual operating system conventions:
- Linux/Unix:
~/.config/incarcero/
- Mac OS X:
~/Library/Application Support/incarcero/
- Win 7+:
C:\Users\<username>\AppData\Local\incarcero\incarcero\
The file is named config.js
and is copied from an example file on first run.
The example configuration is documented.
incarcero uses virtualbox as a back-end by default but since version 0.3.0 support for ESXi / vSphere has been added. Notes about the steps required for ESXi / vSphere support are available. Since everyone's setup is a little bit different do not hesitate to open an issue if you encounter a problem or improve our documentation via a pull request.
We are exploring with the concept of profiles which are stored separately than the configuration and can be used to create files, alter the registry or install additional packages. See profile-example.js for an example configuration. This new capacity is experimental and subject to change as we experiment with it.
Currently, incarcero does not support the automatic creation of the security groups, so you'll have to use the AWS console to create yours. However, using the library Boto3 there should be a way to implement this.
This repository is for research purposes only, the use of this code is your responsibility.
I take NO responsibility and/or liability for how you choose to use any of the source code available here. By using any of the files available in this repository, you understand that you are AGREEING TO USE AT YOUR OWN RISK. Once again, ALL files available here are for EDUCATION and/or RESEARCH purposes ONLY.
I'm not the author of any of the code available here. This repository contains malware source code samples leaked online (and found in multiple other sources), I uploaded it to GitHub to simplify the process of those who want to analyze the code.
Any actions and/or activities related to the material contained within this repository is solely your responsability. Misuse of the information in this repository can result in criminal charges being brought against the persons in question. I will not be held responsible in the event any criminal charges are brought against any individuals misuing the code in this repository to break the law.
This repository does not promote any hacking related activity. All the information in this repository is for educational purposes only.
This project was rejuvenated with the help of malboxes.