Skip to content
This repository has been archived by the owner on Feb 11, 2021. It is now read-only.

Scan files for malicious code #24

Closed
as-com opened this issue Jul 10, 2014 · 4 comments
Closed

Scan files for malicious code #24

as-com opened this issue Jul 10, 2014 · 4 comments

Comments

@as-com
Copy link
Contributor

as-com commented Jul 10, 2014

As mentioned in the Gitter chat room...

Here are some ideas to start with:

  • Scan for domains listed on blacklists (such as this, this, this, this, this or just Google it)
  • Complain when it detects obfuscated code (eval(function(p,a,c,k,e,r){...}), eval(function(p,a,c,k,e,d){...}), eval(function(w,h,a,t,e,v,e,r){...}) or even just eval(function(...){...}))
  • Run code through this service
@megawac
Copy link
Contributor

megawac commented Jul 10, 2014

Ya I looked at wepawet at the start of this project. Couldn't get it working and it's too slow. Need a command line tool.

If anyone has any ideas of how to identify domains in a script let me know

@as-com
Copy link
Contributor Author

as-com commented Jul 10, 2014

Have you looked at this script (graciously provided by Wepawet)?
https://gist.github.com/as-com/3ad1fa206d14f32741ce

Also, I don't think there is a need to find all domains in the files. You could just string.find all of the urls in the blacklists.

@megawac
Copy link
Contributor

megawac commented Aug 8, 2014

I think I'm going to punt on this one unless someone else wants to try and get it working

@as-com
Copy link
Contributor Author

as-com commented Nov 18, 2014

I just tried out VirusTotal on some malicious JavaScript, and the results may be helpful to the bot. It has an api as well.

@megawac megawac closed this as completed Feb 13, 2015
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants