[Blackhat Europe tool] RansomCoin: extract cryptocoin addresses and other indicators of compromise from binaries

[Blackhat Europe tool] RansomCoin: extract cryptocoin addresses and other indicators of compromise from binaries

[ad_1]

RansomCoin

RansomCoin

Extracting metadata and hardcoded Indicators of Compromise from ransomware, in a scalable, efficient, way with cuckoo integrations. Ideally, is it run during cuckoo dynamic analysis, but can also be used for static analysis on large collections of ransomware. Designed to be fast, with low false positive for cryptocurrency addresses. Limited false positives for emails, urls, onions, and domains (which is pretty hard to make perfect).

In short, this is fast and easy initial triage if you only want monetization vectors.

Installation instructions

Please ensure you have Python3 installed.

In a Linux Virtual Machine

It is advisable to download and install a virtualizer such as VirtualBox. Install your desired Linux virtual machine (i.e. Lubuntu, Kali Linux, etc) then follow the instructions below.

git clone https://github.com/Concinnity-Risks/RansomCoinPublic.git

From the tools folder:

sudo apt-get install build-essential libpoppler-cpp-dev pkg-config python-dev python3-tlsh
python3 -m pip install -r requirements.txt

Note: If you get an error saying No module named pip, try running

sudo apt-get install python3-pip

Usage instructions

The following commands can be run from the “Tools” folder to analyze malware samples located in this directory. This will run the code across all files in the directory and provide feedback on the estimated time to completion via TQDM. You will need write access for a file called Ransomware.csv in the directory you are working in (which contains the results). It should be possible to run the code across read-only malware files though, so only Ransomware.csv need write access.

Coinlector.py

After running coinlector.py the results are output to a file in the same directory called Ransomware.csv

python3 coinlector.py

View the results by running

less Ransomware.csv

 

Currently, we are testing for:

  • Bitcoin Addresses (BTC)
  • Bitcoin Cash Addresses (BCH)
  • Monero Addresses (XMR)
  • Bitcoin Private Keys
  • Ethereum addresses (ETH)
  • Ripple addresses (XRP)
  • LTC addresses (LTC)
  • DOGECOIN addresses (DOGE)
  • NEO addresses (NEO)
  • DASH addresses (DASH)
  • Domains (Address)
  • Email Addresses (Email)
  • Onion Addresses (Address)

View URLs, email addresses, and cryptocurrency addresses by running the following grep commands.

less Ransomware.csv | grep URL
less Ransomware.csv | grep Email
less Ransomware.csv | grep Address

Grep for Monero addresses by running

less Ransomware.csv | grep XMR

The same command can be used to search for other cryptocurrencies using the abbreviations in the list above.

Tempuscoin.py

tempuscoin.py outputs a list of timestamped ransom transactions. The file TemporalRansoms.csv is created showing the sending and receiving Bitcoin addresses, the amount in BTC and its equivalent value in EUR, USD at the time of the transaction.

python3 tempuscoin.py

View the results by running.

less TemporalRansoms.csv

 

Eventcoin.py

This code will probably need to be altered to be made usable with your own MISP instance. It uses PyMISP to create events from the Ransomware.csv file, and groups of events share the same name. The default is to create events that are not published, and then to add details by hand before publishing. YMMV.

Demo

Copyright (C) 2018 Concinnity-Risks

Source: https://github.com/Concinnity-Risks/

Share on Facebook

Share on Twitter

The post [Blackhat Europe tool] RansomCoin: extract cryptocoin addresses and other indicators of compromise from binaries appeared first on Penetration Testing.



[ad_2]

Leave a Reply

Your email address will not be published. Required fields are marked *