SRE is designed to dissect the PE files (EXE, DLL) for Static Reversing and Analysis of the malware samples, suspicious executables and extracting the valuable data without execution. It is built with comprehensive analyse techniques to identify malicious infrastructure, libraries etc., and generate results as text files under the analysis_result_binaryname directory generated by this tool, which are useful for further custom in-depth analysis, Dynamic Analysis and to write a detailed technical report.
TIP: If the binary file's name is 'malware.exe', recommended to rename as 'malware_exe' to create meaningful output directory and file names.
Static Analysis: Performs thorough static analysis on the given binary file(s) nine modules and provides an extensive knowledge of the binary file's suspicious characteristics, malicious behaviors, and potential risks.
- Integrity Analyse
- Metadata Analyse
- Packers Detection
- APIs Analyse
- Strings Analyse
- IoCs Extraction
- Malicious Behaviour Analyse
- Disassmembly Dump
- VirusTotal Check <Note: this will not submit the samples to VT.>
200+ Checkpoints: These nine distinct modules are encompass more than 200 checkpoints which cover a wide range of analysis techniques, aiming to provide a comprehensive data of the binary file.
Textfile based Output: The tool saves the analysis outcome as text file. This format is chosen to facilitate easy readable-format, review, and further analysis of the collected information. It allows analysts to search, filter, and process the data efficiently. Also makes it very easy to write custom 'Yara rules'.
Advantages:
- The complete command-line tool with text files as output. <first of it's kind, I guess!>
- The outcome text files are useful for further analyzing the results, creating a detailed report, and writing custom Yara rules. They are also very handy during Dynamic Analysis of the sample.
- It is a command-line tool that is easy to use, automate further, and customizable for in-depth dynamic analysis research.
Limitations:
- No fancy GUI treats! Its all command-line.
- Supports only EXE, DLL file formates (as of now).
- Python 3.10 and above.
- Use 'requirements.txt' file for the pre-requisite installation packages and and they will be installed using:
pip install -r requirements.txt
-
Here are the full list of Python packages as requirements, in case if you need them.
- re, math, magic, yara
- os, sys, subprocess, platform
- pefile, lief
- json, requests
- datetime, time
- hashlib, argparse
-
VirusTotal API Key needs to be palced in 'api_key.txt' file under config directory.
-
Also make sure yara rule files are unzipped and placed under config directory.
for Linux terminal
$ python3 SRE.py [options] [filename]
for Windows cmd promopt
> python3 SREwin.py [options] [filename]
arguments:
filename ~state file path [to scan single file] or state folder path [to scan multiple files]
options:
-h, --help show this help message and exit
-V, --verbose enable verbose terminal output
-f, --file check the file type only (before analyse)
-v, --version show version info
-i, --info show author, email and url info
-l, --license show license info