Skip to content

Commit d749278

Browse files
cerrussellPrabhu SubramanianPrabhu Subramanianprabhu
authored
Merge recent annotation additions into main (#19)
* Tweaks * Tweaks * Suggest fuzzing option * Tweaks dictionary * Improve pe annotations * Bump version * Added authz api for PE * Update packages * Bug fix * Bug fix * Bug fix * Symbols metadata enhancements * Use python 3.10 * Package updates * Package updates * Package updates * Bug fix for packed x86_64 executables * Readme update * Github actions * Github actions * Github actions * Github actions * Github actions * Update packages * Update packages * Package updates Signed-off-by: Prabhu Subramanian <[email protected]> * Update packages Signed-off-by: Prabhu Subramanian <[email protected]> * monero wip Signed-off-by: Prabhu Subramanian <[email protected]> * initial commit * initial commit * Update project website * initial commit Signed-off-by: Caroline Russell <[email protected]> * Banshee and Nidhogg Annotations (#18) * initial commit * Updated summaries and fixed indentation. * Updated nidhogg ID --------- Signed-off-by: Prabhu Subramanian <[email protected]> Signed-off-by: Caroline Russell <[email protected]> Co-authored-by: Prabhu Subramanian <[email protected]> Co-authored-by: Prabhu Subramanian <[email protected]> Co-authored-by: Prabhu Subramanian <[email protected]> Co-authored-by: Caroline Russell <[email protected]>
1 parent 51c0a42 commit d749278

File tree

6 files changed

+262
-2
lines changed

6 files changed

+262
-2
lines changed

.github/workflows/linux.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,4 +48,4 @@ jobs:
4848
with:
4949
files: |
5050
blint/dist/blint
51-
blint/dist/blint.sha256
51+
blint/dist/blint.sha256

.github/workflows/win.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,4 +43,4 @@ jobs:
4343
with:
4444
files: |
4545
blint/dist/blint.exe
46-
blint/dist/blint.exe.sha256
46+
blint/dist/blint.exe.sha256
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
text: Review for Monero identified in a binary produced by cargo build
3+
group: SYMBOL_REVIEWS
4+
exe_type: genericbinary
5+
rules:
6+
- id: MONERO_API_RUST
7+
title: Detect monero API
8+
summary:
9+
description: |
10+
Monero is a cryptocurrency focused on private and censorship-resistant transactions.
11+
patterns:
12+
- blockdata::block::Block
13+
- blockdata::block::BlockHeader
14+
- blockdata::transaction::OwnedTxOut
15+
- blockdata::transaction::Transaction
16+
- blockdata::transaction::TransactionPrefix
17+
- blockdata::transaction::TxIn
18+
- blockdata::transaction::TxOut
19+
- consensus_encode
20+
- consensus_decode
21+
- cryptonote::hash::Hash
22+
- monero::blockdata::transaction::Transaction
23+
- monero::consensus::encode::deserialize
24+
- monero::util::key
25+
- Network::Mainnet
26+
- Network::Stagenet
27+
- util::amount::SignedAmount
28+
- MONERO_MUL_FACTOR
29+
- consensus::encode::Encodable
30+
- TxOutTarget
31+
- tx_pubkey
Lines changed: 178 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,178 @@
1+
---
2+
text: Review for Windows rootkits
3+
group: METHOD_REVIEWS
4+
exe_type:
5+
- x86_64-executable
6+
rules:
7+
- id: BANSHEE
8+
title: Detect Banshee
9+
summary: Patches Kernel to Gain Privileged Access
10+
description: |
11+
Banshee is an experimental Windows x64 Kernel Driver/Rootkit.
12+
patterns:
13+
- banshee.Banshee
14+
- banshee.deviceName
15+
- banshee.driverPath
16+
- banshee.hDevice
17+
- banshee.hSCManager
18+
- banshee.hService
19+
- banshee.Initialize
20+
- banshee.Install
21+
- banshee.InstallDriver
22+
- banshee.IoCtlBuryProcess
23+
- banshee.IoCtlElevateProcessAccessToken
24+
- banshee.IoCtlEnumerateCallbacks
25+
- banshee.IoCtlHideProcess
26+
- banshee.IoCtlKillProcess
27+
- banshee.IoCtlProtectProcess
28+
- banshee.IoCtlTestDriver
29+
- banshee.serviceDescription
30+
- banshee.serviceName
31+
- banshee.StartDriver
32+
- banshee.Unload
33+
- BANSHEE_STATUS
34+
- BE_IOCTL_BURY_PROCESS
35+
- BE_IOCTL_ELEVATE_TOKEN
36+
- BE_IOCTL_ENUMERATE_PROCESS_CALLBACKS
37+
- BE_IOCTL_ENUMERATE_THREAD_CALLBACKS
38+
- BE_IOCTL_HIDE_PROCESS
39+
- BE_IOCTL_KILL_PROCESS
40+
- BE_IOCTL_PROTECT_PROCESS
41+
- BE_IOCTL_TEST_DRIVER
42+
- BeBury_ProcessNotifyRoutineEx
43+
- BeEnumerateDrivers
44+
- BeEnumerateKernelCallbacks
45+
- BeGetAccessTokenOffset
46+
- BeGetDriverForAddress
47+
- BeGetEprocessByPid
48+
- BeGetEprocessProcessProtectionOffset
49+
- BeGetKernelBaseAddr
50+
- BeGetKernelCallbackArrayAddr
51+
- BeGetProcessLinkedListOffset
52+
- BeGlobals::beBuryMutex
53+
- BeGlobals::beBuryTargetProcesses
54+
- BeInitGlobals
55+
- BeGlobals::driverObject
56+
- BeGlobals::NtOsKrnlAddr
57+
- BeIoControl
58+
- BeIoctlBuryProcess
59+
- BeIoCtlElevateProcessAcessToken
60+
- BeIoctlEnumerateCallbacks
61+
- BeIoctlHideProcess
62+
- BeIoctlKillProcess
63+
- BeIoctlProtectProcess
64+
- BeIoctlTestDriver
65+
- BeIsStringNull
66+
- BeIsStringTerminated
67+
- BeUnSupportedFunction
68+
69+
- id: NIDHOGG
70+
title: Detect Nidhogg
71+
summary: Provides Tools for Gaining Privileged Access and Injecting Malicious Code
72+
description: |
73+
Nidhogg is a multi-functional rootkit.
74+
patterns:
75+
- CmCallback
76+
- CmCallbacksList
77+
- IOCTL_NIDHOGG_CLEAR_FILE_PROTECTION
78+
- IOCTL_NIDHOGG_CLEAR_PROCESS_PROTECTION
79+
- IOCTL_NIDHOGG_CLEAR_REGITEMS
80+
- IOCTL_NIDHOGG_CLEAR_THREAD_PROTECTION
81+
- IOCTL_NIDHOGG_ELEVATE_PROCESS
82+
- IOCTL_NIDHOGG_ENABLE_DISABLE_ETWTI
83+
- IOCTL_NIDHOGG_HIDE_PROCESS
84+
- IOCTL_NIDHOGG_HIDE_THREAD
85+
- IOCTL_NIDHOGG_INJECT_DLL
86+
- IOCTL_NIDHOGG_INJECT_SHELLCODE
87+
- IOCTL_NIDHOGG_LIST_OBCALLBACKS
88+
- IOCTL_NIDHOGG_LIST_PSROUTINES
89+
- IOCTL_NIDHOGG_LIST_REGCALLBACKS
90+
- IOCTL_NIDHOGG_PATCH_MODULE
91+
- IOCTL_NIDHOGG_PROTECT_FILE
92+
- IOCTL_NIDHOGG_PROTECT_PROCESS
93+
- IOCTL_NIDHOGG_PROTECT_REGITEM
94+
- IOCTL_NIDHOGG_PROTECT_THREAD
95+
- IOCTL_NIDHOGG_QUERY_FILES
96+
- IOCTL_NIDHOGG_QUERY_PROTECTED_PROCESSES
97+
- IOCTL_NIDHOGG_QUERY_PROTECTED_THREADS
98+
- IOCTL_NIDHOGG_QUERY_REGITEMS
99+
- IOCTL_NIDHOGG_READ_DATA
100+
- IOCTL_NIDHOGG_REMOVE_CALLBACK
101+
- IOCTL_NIDHOGG_RESTORE_CALLBACK
102+
- IOCTL_NIDHOGG_SET_PROCESS_SIGNATURE_LEVEL
103+
- IOCTL_NIDHOGG_UNHIDE_PROCESS
104+
- IOCTL_NIDHOGG_UNPROTECT_FILE
105+
- IOCTL_NIDHOGG_UNPROTECT_PROCESS
106+
- IOCTL_NIDHOGG_UNPROTECT_REGITEM
107+
- IOCTL_NIDHOGG_UNPROTECT_THREAD
108+
- IOCTL_NIDHOGG_WRITE_DATA
109+
- Nidhogg::AntiAnalysis
110+
- Nidhogg::FileUtils
111+
- Nidhogg::ModuleUtils
112+
- Nidhogg::ProcessUtils
113+
- Nidhogg::RegistryUtils
114+
- NIDHOGG_ERROR_CONNECT_DRIVER
115+
- NIDHOGG_ERROR_DEVICECONTROL_DRIVER
116+
- NIDHOGG_GENERAL_ERROR
117+
- NIDHOGG_INVALID_COMMAND
118+
- NIDHOGG_INVALID_OPTION
119+
- NIDHOGG_SUCCESS
120+
- NidhoggAmsiBypass
121+
- NidhoggDisableCallback
122+
- NidhoggEnableDisableEtwTi
123+
- NidhoggETWBypass
124+
- NidhoggFileClearAllProtection
125+
- NidhoggFileProtect
126+
- NidhoggFileUnprotect
127+
- NidhoggInjectDll
128+
- NidhoggInjectShellcode
129+
- NidhoggListObCallbacks
130+
- NidhoggListPsRoutines
131+
- NidhoggListRegistryCallbacks
132+
- NidhoggPatchModule
133+
- NidhoggProcessClearAllProtection
134+
- NidhoggProcessElevate
135+
- NidhoggProcessHide
136+
- NidhoggProcessProtect
137+
- NidhoggProcessSetProtection
138+
- NidhoggProcessUnhide
139+
- NidhoggProcessUnprotect
140+
- NidhoggQueryFiles
141+
- NidhoggQueryProcesses
142+
- NidhoggQueryThreads
143+
- NidhoggReadData
144+
- NidhoggRegistryClearAll
145+
- NidhoggRegistryHideKey
146+
- NidhoggRegistryHideValue
147+
- NidhoggRegistryProtectKey
148+
- NidhoggRegistryProtectValue
149+
- NidhoggRegistryQueryHiddenKeys
150+
- NidhoggRegistryQueryHiddenValues
151+
- NidhoggRegistryQueryProtectedKeys
152+
- NidhoggRegistryQueryProtectedValues
153+
- NidhoggRegistryUnhideKey
154+
- NidhoggRegistryUnhideValue
155+
- NidhoggRegistryUnprotectKey
156+
- NidhoggRegistryUnprotectValue
157+
- NidhoggRestoreCallback
158+
- NidhoggThreadClearAllProtection
159+
- NidhoggThreadHide
160+
- NidhoggThreadProtect
161+
- NidhoggThreadUnprotect
162+
- NidhoggWriteData
163+
- ObCallbacksList
164+
- PatchedModule.FunctionName
165+
- PatchedModule.ModuleName
166+
- PatchedModule.Patch
167+
- PatchedModule.PatchLength
168+
- PatchedModule.Pid
169+
- PkgReadWriteData
170+
- PROCESS_TYPE_PROTECTED
171+
- PROCESS_TYPE_SPOOFED
172+
- ProcessSignature.Pid
173+
- ProcessSignature.SignatureSigner
174+
- ProcessSignature.SignerType
175+
- PsRoutinesList
176+
- ShellcodeInformation
177+
178+
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
text: Review for Hooka
3+
group: SYMBOL_REVIEWS
4+
exe_type:
5+
- gobinary
6+
- x86_64-executable
7+
- genericbinary
8+
rules:
9+
- id: HOOKA
10+
title: Detect use of Hooka tools
11+
summary:
12+
description: |
13+
Hooka is a shellcode loader with bypassing capabilities, hooks detector and more written in Golang
14+
patterns:
15+
- hooka.CreateRemoteThreadHalos
16+
- hooka.DetectHooks
17+
- hooka.DetectHooks
18+
- hooka.DumpLsass
19+
- hooka.ElevateProcessToken
20+
- hooka.EnumSystemLocales
21+
- hooka.EnumSystemLocalesHalos
22+
- hooka.EtwpCreateEtwThread
23+
- hooka.Execute
24+
- hooka.Fibers
25+
- hooka.FullUnhook
26+
- hooka.FuncFromHash
27+
- hooka.GetEventLogPid
28+
- hooka.GetFuncPtr
29+
- hooka.GetShellcodeFromFile
30+
- hooka.GetShellcodeFromFile
31+
- hooka.GetShellcodeFromUrl
32+
- hooka.GetShellcodeFromUrl
33+
- hooka.GetSysId
34+
- hooka.HashFromFunc
35+
- hooka.Inject
36+
- hooka.IsHooked
37+
- hooka.PatchAmsi
38+
- hooka.PatchAmsi
39+
- hooka.PatchEtw
40+
- hooka.PerunsUnhook
41+
- hooka.Phant0m
42+
- hooka.Phant0mWithOutput
43+
- hooka.Phant0mWithOutput
44+
- hooka.QueueUserApc
45+
- hooka.RtlCreateUserThread
46+
- hooka.Syscall
47+
- hooka.UuidFromString
48+
- hooka.WriteMemory
49+
50+

poetry.lock

Lines changed: 1 addition & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)