All Projects → We5ter → Flerken

We5ter / Flerken

Licence: apache-2.0
A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会

Projects that are alternatives of or similar to Flerken

TweetFeed
Collecting IOCs posted on Twitter
Stars: ✭ 181 (+36.09%)
Mutual labels:  blueteam, malware-detection
Lolbas
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stars: ✭ 1,506 (+1032.33%)
Mutual labels:  blueteam
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-48.12%)
Mutual labels:  malware-detection
Droidcc
🤖Android malware detection using deep learning, contains android malware samples, papers, tools etc.🐛
Stars: ✭ 94 (-29.32%)
Mutual labels:  malware-detection
Ultimateapplockerbypasslist
The goal of this repository is to document the most common techniques to bypass AppLocker.
Stars: ✭ 1,186 (+791.73%)
Mutual labels:  blueteam
Malwarepersistencescripts
A collection of scripts I've written to help red and blue teams with malware persistence techniques.
Stars: ✭ 103 (-22.56%)
Mutual labels:  blueteam
Owasp Seraphimdroid
OWASP Seraphimdroid is an open source project with aim to create, as a community, an open platform for education and protection of Android users against privacy and security threats.
Stars: ✭ 62 (-53.38%)
Mutual labels:  malware-detection
Falconfriday
Bi-weekly hunting queries
Stars: ✭ 125 (-6.02%)
Mutual labels:  blueteam
Deploy Deception
A PowerShell module to deploy active directory decoy objects.
Stars: ✭ 109 (-18.05%)
Mutual labels:  blueteam
Threathunt
ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
Stars: ✭ 92 (-30.83%)
Mutual labels:  blueteam
Blackbook
Blackbook of malware domains
Stars: ✭ 89 (-33.08%)
Mutual labels:  malware-detection
Masc
A Web Malware Scanner
Stars: ✭ 74 (-44.36%)
Mutual labels:  malware-detection
Awesome Yara
A curated list of awesome YARA rules, tools, and people.
Stars: ✭ 1,394 (+948.12%)
Mutual labels:  malware-detection
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-45.86%)
Mutual labels:  blueteam
Macos Attack Dataset
JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.
Stars: ✭ 116 (-12.78%)
Mutual labels:  blueteam
Binaryalert
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.
Stars: ✭ 1,125 (+745.86%)
Mutual labels:  malware-detection
Malware Classification
Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification
Stars: ✭ 88 (-33.83%)
Mutual labels:  malware-detection
Rita
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Stars: ✭ 1,352 (+916.54%)
Mutual labels:  blueteam
Gitlab Watchman
Monitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (-4.51%)
Mutual labels:  blueteam
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1365.41%)
Mutual labels:  blueteam

Flerken

python 3.x license

Introduction

Command Line Obfuscation (CLOB) has been proved to be a non-negligible factor in fileless malware or malicious actors that are "living off the land". With dozens of obfuscation tools seen in the wild, by contrast few proper countermeasures can be found. In this talk, we present Flerken, an obfuscation detection approach that works for both Windows (Powershell and CMD) and Linux (Bash) commands. To the best of our knowledge, Flerken is the first solution that supports cross-platform obfuscation detection feature.

This talk first shares some key observations on CLOB such as its attack vectors and analyzing strategies. Then we give a detailed design of Flerken. The description is divided in two parts, namely Kindle (for Windows) and Octopus (for Linux). Respectively, we will show how human readability can serve as an effective statistical feature against PS/CMD obfuscation, and how dynamic syntax parsing can be adopted to eliminate false positives/negatives against Bash CLOB. The effectiveness of Flerken is evaluated via representative black/white command samples and performance experiments.

Hereby, we highlight the functional properties Flerken basically satisfies as follows:

Scalability. Flerken supports cross-platform obfuscation detection. Furthermore, Flerken can help achieve real-time obfuscation bubbling in server EDR systems (with a scale on the order of millions).

Accuracy. Flerken is adequate to correctly distinguish most Windows/Linux command obfuscations. Therefore, Flerken can be adopted by enterprises in many security investigations of server endpoints.

Availability. Flerken now is accessible through its official webpage. All you have to do is to paste into the command string and test what you want to analyze. No specific input file format is required. We have also open-sourced Flerken on Github so you can build your own detector on demand.

Upcoming Release

  • De-Obfuscated-Bash Tool: An image of the octopusbash-embedded docker.
  • A Web Manage Platform to monitor, config workflow of Flerken, also analysis the workflow ouput results.

Web Demo Source Code

Please checkout our another branch web-demo.

Getting Help

If you have any question or feedbacks on Flerken. Please create an issue and choose a suitable label for it. We will solve it as soon as possible.

CHANGELOG

Please see our CHANGELOG.md

Authors

Acknowledgments

We would like to thank all the contributors to this research project and all the members in Tencent Blade Team. In addition, we would like to thank security researchers Daniel Bohannon and Andrew LeFevre for their valuable feedback and discussion.

License

Flerken is released under the Apache 2.0 license.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].