Giter VIP home page Giter VIP logo

apt-ecosystem's Introduction

Russian APT Ecosystem

This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map the connections inside the APT Ecosystem of Russia.

The website stored in this repository can be found in https://apt-ecosystem.com

The publication can be found on our websites:

Connection Map

This map was created to make the results of our APT Russian Ecosystem research accesible. We recommend to read the full research in order to use this map in its full context.

The russian APT map is a web-based, interactive map that shows the different families and actors that are part of the Russian APT ecosystem, as well as the connections between them. The map is basically a one stop shop for anyone who is interested to learn and understand the connections and attributions of the samples, modules, families and actors that together are building this ecosystem.

The map in intuitive and rich with information. The user can get a full overview of the ecosystem or drill down into specific connections. By clicking on nodes in the graph, a side panel will reveal, containing information about the malware family the node belongs to, as well as links to analysis reports on Intezer’s platform and external links to related articles and publications. Basically, this side-panel is a short identity-card of the entities in the map.

The map and its data are open source in this repository and we are inviting you all to add more information and improve it.

Russian APT Detector

Having access to more than 3.5 Million pieces of code that were shared between the Russian APT samples we gathered, allowed us to understand which unique genes are popular and more likely to be shared between samples, families, and actors. We used this knowledge to write a tool that can be used by organizations, CERT teams, researchers, and individuals to scan a specific file, a folder, or a whole file system, and search for infections by Russian APTs.

The tool, which we named Russian APT Detector, is a set of Yara rules produced by Intezer’s platform. The rules contain byte-sequences of popular mutual code between one or more samples. We then wrapped it up in a binary to ease the use of the tool. The full ruleset can be found in this repository, and can be used freely using your favorite Yara scanner. Don’t hesitate to integrate this ruleset into your platform and toolset.

Download

The tool can be downloaded as a Windows Executable from our Releases page. The tool is a python script, wrapped into an executable along with the Yara ruleset and the Yara binaries.

Alternatively, and for those of you who want to execute the tool on Linux or macOS, you can use detector.py along with the ruleset which are available in this repository.

Usage

You can use the APT Detector tool by executing Detector.exe with the argument described below.

Russian APT Detector
---------------------

usage: Detector.exe [-h] -t TARGET [TARGET ...] [-r]
Detector.exe: error: argument -t/--target is required

Example: C:\> Detector.exe -t C:\some_directory -r

If you are using the python version of the tool (detector.py and not the executable), the command line arguments are the same.

Contributing

Pull requests are welcome. We invite you to improve the connection-map and the Python or the Yara rules of the detector tool

apt-ecosystem's People

Contributors

ariei4 avatar flindeberg avatar h0ffayyy avatar itayc0hen avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

apt-ecosystem's Issues

Needs documentation!

Please write some documentation on what this does, how to "install" it, and how to run it.
The only documentation is the README, which isn't included in the download RussianAPTDetector, doesn't list all the command line parameters, and doesn't explain the meaning of -r.
A key point not mentioned is that, after downloading the code from github, you need to open index.html in a web browser, download the file, unzip it, and then add its contents to the directory containing index.html.

As it is, non-programmers won't be able to run it at all.

The downloaded files include a web page, "index.html", which, when opened, downloads the file RussianAPTDetector.7z .
This file includes three executables.

Running any of the three files from Windows does nothing but open and then shut a window.
By first opening a Cygwin shell, and then running them from within that shell, I found that:

-- Running Detector.exe produces this output:

usage: Detector.exe [-h] -t TARGET [TARGET ...] [-r]
Detector.exe: error: argument -t/--target is required

No indication what "TARGET" means, or what the arguments -r or -h do.

Running yara64.exe like this:

./yara64 rules.yar C:

makes it appear to scan my C drive, but very quickly, and it generates only a list of warnings.

If you're using Linux, the python file detector.py assumes you already have compiled the executable "yara" and added its location to your PATH.

Reading detector.py reveals that:
-t gives the drive or directory to scan. (To pass this to yara, you need to just put that target directory immediately after the rules file; yara doesn't want parm flags.)
-r means do a recursive scan, which I would think should be the default but I don't know how ransomware behaves
-p 8 means that the computer has 8 CPUs, or maybe 8 cores

Won't run on a Windows C drive

Running on a Windows system C drive leads to an infinite recursion of error messages like this:

error scanning C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows<etc; path here is irrelevant>

The problem is that, in Win 7 and on, "Application Data" is neither a directory, link, or hard link, but a "juncture". This is another idiotic Microsoft innovation that causes Windows errors frequently and is unfixable because it's baked into the OS. It points at itself, and then "prevents" infinite loops from occurring by putting "deny all read privs" on itself. But since your code is reading directories in some more direct way, it gets past the Windows "deny", and gets the infinite loop.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.