Skip to content

Recruit-CSIRT/odoriba

Repository files navigation

Odoriba


A kind of Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox 2.0-rc1 written in Python2.

Description

the deep customized sandbox system for CSIRT.

  • Customized dynamic agent for malwares to behave more active in our workplace environment.
  • Analyze C&C servers automatically in terms of capability of Block.
  • you can install AntiVirus software to GuestVM.
    Operation Check :
    Guest VM : Windows7 x86
    Host OS: OSX 10

The background and details was presented in FIRST TC Amusterdam 2017
https://www.first.org/events/colloquia/amsterdam2017/program#precruit-csirt

Demo

this demo is captured by develop environment not except normal traffic filter.
So these IP addresses are just samples for demo.
(realtimeDemo is damaged partially, I recommend showing it via GoogleChrome if Demo doesn't work well.)

Launch Demo
launchDemo
Real-time View Demo
realtimeDemo

Comparison Cuckoo Sandbox

Cuckoo Sandbox 2.0 rc1

Odoriba's Difference

  • Real-­time Visualization the analyzed behavior on Web UI.
  • 100MB over Huge File Submittion
  • Collect malwares Malwr(does't work now) or FireEye AX and auto submit

Modified Script Files from Cuckoo Sandbox default

and Configuration Files ./conf/

Created Script Files by Recruit-CSIRT

Created For Realtime View

Requirements

  • Cuckoo sandbox requirements is necessary.
    In Addition, python modules
  • requests, selenium webdriver, BeautifulSoup, InsecureRequestWarning

Usage

change network signitures in several python codes : your IP, user-agent etc, modify "Write your own" values.
In your UNIX Host machine (ex. OSX),
$ cd ~
$ git clone https://github.com/Recruit-CSIRT/odoriba.git

set your Guest Machine configuration in ./conf/ set your Guest IP in ./internet_control.py (this modules support VirtualBox and VMware)

<python 2.7.x>
$ python odoriba.py [vmware or virtualbox] [add or init or none] [malwr or ax or none]
// sys.argv[1] = GUEST VM environment , odoriba support vmware or virtualbox
// sys.argv[2] = Setting options
init = cuckoo have't launched yet.
add = cuckoo launched and add malware seeds via sys.argv[3]
none = cuckoo launched and skip add seeds
//sys.argv[3] = Where malware download from
malwr = malwr's recent analysis samples Malwr implemented Google reCAPTCHA, this option doesn't work now.
ax = your FireEye AX
none = skip download and you can submit manually

if you batch collect malware seeds, set cron this procedure.
$ python odoriba.py [vmware or virtualbox] add [malwr or ax]

After Cuckoo Sandbox start working, you can submit files and urls to cuckoo's submit page.

Install

Install Example
OR
Install Cuckoo Sandbox and replace the above [Modified and Created Files] in the cuckoo folder.
If you find some errors , please handle by yourself at first.
Some error may happen because your working directory name still cuckoo ,
please change to odoriba or modify odoriba's source code by yourself.

Recruit-CSIRT does not assume any responsibility about using odoriba.

you can take advantage on Self-responsibility

Licence

GPLv3

Author

Tatsuya Ichida (icchida) Ref: r-csirt (r-csirt)

About

Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published