Skip to content

MalFinder is a tool that retrieves the Import Address Table (IAT) of a PE file, prints the suspicious APIs, their descriptions, and how they are used for malicious purposes."

Notifications You must be signed in to change notification settings

J0eBinary/MalFinder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 

Repository files navigation

MalFinder

This tool takes a PE file (e.g. *.exe) and checks if the Import Address Table (IAT) contains a suspicious function that is usually used in malware. The process is done by checking if the function name is present at https://malapi.io/ . If so, the tool returns the description of the function and what it is used for.

Installation

git clone https://github.com/oh-az/MalFinder.git
cd MalFinder

Dependencies

dependencies can be installed using the requirements file:

sudo pip3 install -r requirements.txt

Usage

python3 MalFinder.py malware.exe
python3 MalFinder.py mal_library.dll

Capture image

Added Features

these new features are add by oh-az

  • Detect the use of Direct Syscalls by disassembling the binary and looking into it.

Capture2

  • Display information about the binary.
  • Calculate each section's entropy to detect potential obfuscation/packing

Capture

  • Calculate each section's virtual and raw size to detect the potential of packing.

Capture3

  • Extract all IPs from the binary.

    Capture4

  • Calculate the MD5 hash and sends it to VirusTotal, then it prints out how many vendors have flagged this binary.

Capture5

Contact

Version

Current version is 1.2

About

MalFinder is a tool that retrieves the Import Address Table (IAT) of a PE file, prints the suspicious APIs, their descriptions, and how they are used for malicious purposes."

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages