CodeMagic / DataTransformer

Command-line decryption tool for static malware analysis.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

DataTransformer - DT

DT is a command-line, static-analysis tool intended for malware researchers and reverse engineers. It contains routines for various decompression and decryption algorithms typically used by malware.

It is licensed under GNU/GPL version 3.

Scope

Note that the aim of the project is not to implement all compression and encryption algorithms.

The objective is to document algorithms used for obfuscation and data-hiding seen in malware samples. The idea is to have one tool capable of statically revealing crypted or compressed data within a malware sample instead of needing a collection of tools to decrypt data or debugging samples to arrive at the decrypted data. Individual operations can be combined and sent to DT (for example: Rolling XOR + ADD).

Example Use Cases:

TODO

Supported Algorithms

  • Cut (Extract selected bytes)
  • Reverse (Reverses selected bytes)
  • UnHexlify + Hexlify (Converts raw bytes into string representations of its hex equivalent)
  • Base64
  • MD5
  • SHA256
  • SHA512
  • AES (ECB mode)
  • AES (CBC mode)
  • GZip
  • APLIB
  • RC4
  • Modified RC4
  • LZNT
  • TEA
  • ZLIB
  • Simple ADD/SUB
  • Rolling ADD/SUB
  • Simple XOR (w/ N-byte key)
  • Rolling XOR (w/ N-byte key)
  • Rolling XOR (w/ N-byte key)
  • RoL/RoR

Build

DT is written in Python 2.7.9+.

Dependencies (TODO:)

hexdump package (included)

Contributions

Feel free to send pull requests and bug reports.

About

Command-line decryption tool for static malware analysis.


Languages

Language:Python 100.0%