All Projects → Hestat → calamity

Hestat / calamity

Licence: GPL-3.0 license
A script to assist in processing forensic RAM captures for malware triage

Programming Languages

shell
77523 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to calamity

yara-rules
Yara rules written by me, for free use.
Stars: ✭ 13 (-45.83%)
Mutual labels:  dfir, malware-analysis
malhunt
Hunt malware with Volatility
Stars: ✭ 30 (+25%)
Mutual labels:  malware-analysis, volatility
Pe Sieve
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
Stars: ✭ 1,783 (+7329.17%)
Mutual labels:  malware-analysis, memory-forensics
Malcom
Malcom - Malware Communications Analyzer
Stars: ✭ 988 (+4016.67%)
Mutual labels:  dfir, malware-analysis
Malice
VirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+5120.83%)
Mutual labels:  dfir, malware-analysis
pftriage
Python tool and library to help analyze files during malware triage and analysis.
Stars: ✭ 77 (+220.83%)
Mutual labels:  dfir, malware-analysis
Cirtkit
Tools for the Computer Incident Response Team 💻
Stars: ✭ 117 (+387.5%)
Mutual labels:  dfir, malware-analysis
MemProcFS-Analyzer
MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Stars: ✭ 89 (+270.83%)
Mutual labels:  dfir, memory-forensics
DDTTX
DDTTX Tabletop Trainings
Stars: ✭ 22 (-8.33%)
Mutual labels:  dfir
Malware-Detection-Tools
A list of awesome malware detection tools
Stars: ✭ 30 (+25%)
Mutual labels:  malware-analysis
EventTranscriptParser
Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-8.33%)
Mutual labels:  dfir
Get-NetworkConnection
Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection
Stars: ✭ 34 (+41.67%)
Mutual labels:  dfir
OLEPackagerFormat
OLE Package Format Documentation
Stars: ✭ 18 (-25%)
Mutual labels:  malware-analysis
flare-on-challenges
Write-ups for FireEye's FLARE-On challenges
Stars: ✭ 24 (+0%)
Mutual labels:  malware-analysis
impfuzzy
Fuzzy Hash calculated from import API of PE files
Stars: ✭ 67 (+179.17%)
Mutual labels:  volatility
yara-validator
Validates yara rules and tries to repair the broken ones.
Stars: ✭ 37 (+54.17%)
Mutual labels:  dfir
catalyst
Catalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (+279.17%)
Mutual labels:  dfir
LevelDBDumper
Dumps all of the Key/Value pairs from a LevelDB database
Stars: ✭ 23 (-4.17%)
Mutual labels:  dfir
malwinx
Just a normal flask web app to understand win32api with code snippets and references.
Stars: ✭ 76 (+216.67%)
Mutual labels:  malware-analysis
smram parse
System Management RAM analysis tool
Stars: ✭ 50 (+108.33%)
Mutual labels:  dfir

Calamity

================================================================================

      ========================= Calamity =========================

A script to assist in processing forensic RAM captures for malware triage

Run the script with no options and it will run in guided mode prompting the
user to choose options as required

If you already know the correct volatility memory profile you can use the
following options
 -f, --filepath  provide the complete filepath to the RAM memory dump
 -p, --profile   provide the memory profile you want volatility to use
 -s, --scan      will run all scans and prompt user as required
 -q, --quick     will run a quick scan for malware, no user input required to complete
 -c, --config    same as quickscan but will try to extract malware configurations as well

Example:
calamity -f /home/user/memory.dmp -p Win10x64_10586 -s

calamity --fullpath /home/user/memory.dmp --profile Win10x64_10586 --scan

================================================================================

Full walkthrough and writeup: https://laskowski-tech.com/2019/05/18/calamity-a-volatility-script-to-aid-malware-triage/

Original inspiration to Volatility Labs writeup in this article: https://volatility-labs.blogspot.com/2016/08/automating-detection-of-known-malware.html

Which led me to write up my version: https://laskowski-tech.com/2019/02/18/volatility-workflow-for-basic-incident-response/

Which led to this project. Good Hunting.

Install instructions:

On base system (has been tested for Ubuntu, Kali)

git clone https://github.com/Hestat/calamity.git
cd calamity
sudo ./install.sh

Docker option:

docker pull hestat/calamity

docker run --rm -it -v ~/memory-dumps:/home/nonroot/memdumps hestat/calamity:latest bash

The /memory-dumps folder is where the memory images reside on the host OS, you will be dropped into a bash shell in the home directory of the nonroot user with a folder called memdumps which is mapped to the folder on the host OS.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].