Qu1cksc0pe – All-in-One Static Malware Analysis Tool

This tool allows you to statically analyze Windows, Linux, OSX executables and APK files.

You can get:

  • What DLL files are used.
  • Functions and APIs.
  • Sections and segments.
  • URLs, IP addresses and emails.
  • Android permissions.
  • File extensions and their names.
    And so on…

Qu1cksc0pe aims to get even more information about suspicious files and helps user realize what that file is capable of.

Usage

python3 qu1cksc0pe.py --file suspicious_file --analyze

Setup

Necessary python modules:

  • puremagic => Analyzing target OS and magic numbers.
  • androguard => Analyzing APK files.
  • apkid => Check for Obfuscators, Anti-Disassembly, Anti-VM and Anti-Debug.
  • prettytable => Pretty outputs.
  • tqdm => Progressbar animation.
  • colorama => Colored outputs.
  • oletools => Analyzing VBA Macros.
  • pefile => Gathering all information from PE files.
  • quark-engine => Extracting IP addresses and URLs from APK files.
  • pyaxmlparser => Gathering informations from target APK files.
  • yara-python => Android library scanning with Yara rules.
  • prompt_toolkit => Interactive shell.

Installation of python modules: pip3 install -r requirements.txt
Gathering other dependencies:

  • VirusTotal API Key: https://virustotal.com
  • Binutils: sudo apt-get install binutils
  • ExifTool: sudo apt-get install exiftool
  • Strings: sudo apt-get install strings

Alert

You must specify jadx binary path in Systems/Android/libScanner.conf

[Rule_PATH]
rulepath = /Systems/Android/YaraRules/

[Decompiler]
decompiler = JADX_BINARY_PATH <-- You must specify this.

Installation

  • You can install Qu1cksc0pe easily on your system. Just execute the following command.
    Command 0: sudo pip3 install -r requirements.txt
    Command 1: sudo python3 qu1cksc0pe.py --install

Scan arguments

Normal analysis

Usage: python3 qu1cksc0pe.py --file suspicious_file --analyze

AVvXsEh b8 nQSnuJuTjAY26gks0F7ldxDrPHs6me gGQ5AZHmzifYsLU2vnoK3 mSWj1CX 8IMC3FoRYsOj1xPQx8Wy1nhE DzNzmojjJC2dn5dfbd3VRKgHNlMBrCyVvWO5tX JQXXf5epybprhLqM3TO6kqZmw7tQF8cHthstZnCH hvvWLBDc52fejhglA=w606 h640

Multiple analysis

Usage: python3 qu1cksc0pe.py --multiple FILE1 FILE2 ...

AVvXsEhtspm4FAb11fyuWRqcNLLruFNQAULwlcgh3W PMQj4QrAXZfbGam KuuZn7jVuNWv4cmXcaGcvCCVc2RkEVelQrP6cL43AaXmgr3LGL A11T4Tz7LDZ5ufJ5996Kf58w5gjpvizc28prFtDE3iyjMKdlMZa6vS n s s XqzL GqeKUUn7b5gUJJCGA=w640 h484

Hash scan

Usage: python3 qu1cksc0pe.py --file suspicious_file --hashscan

AVvXsEjdOirZ4ALyRIZrjHwWFuOkrmq5cGfoHXoZ8 0vy6KToTV6dhAOA51qtQ xUu5zgD9GX0gLMylb7eKQS6phAUinDZ B NPwJdD3UX6pmYYUvTESZgn0cDOva1BgKe7Y9PfLbU97g3fBGCfn3v9kY2JaFqAnmwxSbatsqr11f2nIm6IDIhsuKgbhL14pIg=w640 h498

Folder scan

Supported Arguments:

  • --hashscan
  • --packer

Usage: python3 qu1cksc0pe.py --folder FOLDER --hashscan

AVvXsEgtICJQc z4SrZ0oe8TlbdMU16HP1Ssae 7Ej6cXOSHiAx6Baip8RNkwf8rxgJgiBHHUriWYprNSElDAweR5P80NCHif9 c6pW5B J8aDR2KUPHAqWLJIOWpAjbdR2lY fZEnyxXa1yPKjzGjyQQFbG2io uWUEAHJUOKbftWB97KGKbDXgPBPtILm96Q=w640 h432


VirusTotal

Report Contents:

  • Threat Categories
  • Detections
  • CrowdSourced IDS Reports

Usage for –vtFile: python3 qu1cksc0pe.py --file suspicious_file --vtFile

AVvXsEgJrU HdzcZPUQVUyH1DZV6O6dtMqMKueYSqQHdMeERLqFIAPRT95eK88ceoWO rZrkvLKymUxVnP IupffN Ir5ErtTXpY9qyTpsWt9a9ME3vN7C2myjUYdsbYt5VjDRybuIIZXT6p61cGCMz jeevC0w bQezeICtQBlDHlrrzxSh6dqDstfB3uPxLg=w602 h640


Document scan

Usage: python3 qu1cksc0pe.py --file suspicious_document --docs

AVvXsEjbAekIL3qLPACHxnm 9o0OHvbRbdly82z5OiBPwMl PNgT3bUdDwotuicQlLIQROZoEwM GLKapA5U6hMlwlRFITQpvnvQxZtlZfOmaXVdGfLnApVlRwuAgl7snV PL4voFbSaRtTMdErB247DXvIrtPgwfb9uaSzkwhlMQWumrnjblJhQbmaIkLfQKA=w640 h440

Programming language detection

Usage: python3 qu1cksc0pe.py --file suspicious_executable --lang

AVvXsEgGmB4tFvSa6z1dOdEUyD0rM80W1VBd8C4MPdapLs1CIaJAVCQry98c9upNcnkMato1ESztS5SZ4wW unoMjoTUL8Fpp7M31bvTRfXnYevkeKZkk6FGoumhn0m9JJnn6yu5ev6mejEq82kzMC3H4nv97aw3vSfsD1SQyZ BAMQKz72G4kxBxRIdhftl1Q=w640 h430

Interactive shell

Usage: python3 qu1cksc0pe.py --console

AVvXsEjEtCZ6WY5ZuufmrFpoABNAhByhlHrqpNa GpM4xYFCtR43y AoyvXEbULxQEzA5qXYR djHfIEV OoiJnAE3gC2UNfeueEAiv52LsFJPCPJ0eR1FfzQBjvJw uaTVGc5rKvNpfCwZcW KlTqLrt4nnmtZW3bsV11CulpFMqJxWzhGWMBEc6e1mDOA4FA=w640 h580

Domain

Usage: python3 qu1cksc0pe.py --file suspicious_file --domain

Informations about categories

Registry

This category contains functions and strings about:

  • Creating or destroying registry keys.
  • Changing registry keys and logs.

File

This category contains functions and strings about:

  • Creating/modifying/infecting/deleting files.
  • Getting information about file contents and filesystems.

Networking/Web

This category contains functions and strings about:

  • Communicating with malicious hosts.
  • Downloading malicious files.
  • Sending informations about infected machine and its user.

Process

This category contains functions and strings about:

  • Creating/infecting/terminating processes.
  • Manipulating processes.

Dll/Resource Handling

This category contains functions and strings about:

  • Handling DLL files and another malware’s resource files.
  • Infecting and manipulating DLL files.

Evasion/Bypassing

This category contains functions and strings about:

  • Manipulating Windows security policies and bypassing restrictions.
  • Detecting debuggers and doing evasive tricks.

System/Persistence

This category contains functions and strings about:

  • Executing system commands.
  • Manipulating system files and system options to get persistence in target systems.

COMObject

This category contains functions and strings about:

  • Microsoft’s Component Object Model system.

Cryptography

This category contains functions and strings about:

  • Encrypting and decrypting files.
  • Creating and destroying hashes.

Information Gathering

This category contains functions and strings about:

  • Gathering informations from target hosts like process states, network devices etc.

Keyboard/Keylogging

This category contains functions and strings about:

  • Tracking infected machine’s keyboard.
  • Gathering information about targets keyboard.
  • Managing input methods etc.

Memory Management

This category contains functions and strings about:

  • Manipulating and using target machines memory.

ys6mOCgDrS8

click here to read full Article

Read More on Pentesting Tools

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: