Skip to content
No description, website, or topics provided.
Python
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
apt28_29_test
LICENSE
Logo
README.md
config.py
neokanji.py
requirements
version

README.md

NeoKanji

NeoKanji is a tool that looks forward to helping researchers with visualization and correlation of threat actors, campaigns, malware samples, signatures and other characteristics in a set of data.

Getting Started

You need an instance of NEO4J running in your host. The easiest way to set it up is to run the following command:

docker run \
    --publish=7474:7474 --publish=7687:7687 \
    --volume=$HOME/neo4j/data:/data \
    --volume=$HOME/neo4j/logs:/logs \
    neo4j:3.0

Once set up, browse to http://localhost:7474/browser/ and change your password. Configure config.py file with your data.

Place your JSONs files in a folder and then simply run

python neokanji.py -i <inputfolder>

Open your Neo4J instance and start playing with data. I strongly recommend to read Cyber Query Language Introduction to improve queries performance and finding interesting items.

Prerequisites

Libraries needed:

  • py2neo

Docker is needed and strongly recommended.

Input Format

Neokanji should be feed with JSON files describing behavior and/or attributes.

data must be provided by yourself.

The input JSON file should look like this:

{
   "SHA1":"c380038a57ffb8c064851b898f630312fabcbba7",
   "Interesting":[
      "'%s.dll'",
      "'d$(.dll'",
      "'d$8.dll'",
      "'oleaut32.dll'",
      "'ole32.dll'"
   ],
   "Last_Saved":"-",
   "Compilation_Time":"2002-02-05 17:36:26",
   "SHA256":"4013d3c221c6924e8c525aac7ed0402bd5349a28dcbc20bc1ff6bd09079faacf",
   "PDB":[

   ],
   "MD5":"fd7e0ecc41735d3ba0329e1e311689f8",
   "Signatures":[
      {
         "description":"this executable is signed",
         "severity":1
      },
      {
         "description":"one or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.",
         "severity":2
      },
      {
         "description":"allocates read-write-execute memory (usually to unpack itself)",
         "severity":2
      },
      {
         "description":"one or more of the buffers contains an embedded pe file",
         "severity":3
      },
      {
         "description":"executed a process and injected code into it, probably while unpacking",
  }

❗️Note that Signatures were made (slightly) based on Cuckoo Sandbox's Signatures, although it's easy to change that part of the code to fit other signatures ☝️.

What's Next

Our future feautures are:

  • Integration with MISP

Probably:

  • Attributes extention

This tool exists thanks to:

Neo4J

Docker

Cuckoo Sandbox

Acknowledgments

Our special thanks to Nicolas Raus for helping us through the initial stage of this project, and his coding skills that made this possible.

License

Copyright (c) 2017 Deloitte Argentina

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

You can’t perform that action at this time.