Pepper - An Opened Upwards Origin Script To Perform Malware Static Analysis On Portable Executable


An opened upward source tool to perform malware static analysis on Portable Executable

Installation
eva@paradise: $ git clone https://github.com/Th3Hurrican3/PEpper/ eva@paradise: $ cd PEpper eva@paradise: $ pip3 install -r requirements.txt eva@paradise: $ python3 pepper.py ./malware_dir


Screenshot





CSV output


Feature extracted
  • Suspicious entropy ratio
  • Suspicious name ratio
  • Suspicious code size
  • Suspicious debugging time-stamp
  • Number of export
  • Number of anti-debugging calls
  • Number of virtual-machine detection calls
  • Number of suspicious API calls
  • Number of suspicious strings
  • Number of YARA rules matches
  • Number of URL found
  • Number of IP found
  • Cookie on the stack (GS) support
  • Control Flow Guard (CFG) support
  • Data Execution Prevention (DEP) support
  • Address Space Layout Randomization (ASLR) support
  • Structured Exception Handling (SEH) support
  • Thread Local Storage (TLS) support
  • Presence of manifest
  • Presence of version
  • Presence of digital certificate
  • Packer detection
  • VirusTotal database detection
  • Import hash

Notes
  • Can survive run on single or multiple PE (placed within a directory)
  • Output volition survive saved (in the same directory of pepper.py) every bit output.csv
  • To role VirusTotal scan, add together your mortal fundamental inwards the module called "virustotal.py" (Internet connector required)

Credits
Many thank y'all to those who indirectly helped me inwards this work, specially:
  • The LIEF projection together with its awesome library
  • PEstudio, a actually amazing software to analyze PE
  • PEframe from guelfoweb, an incredible widespread tool to perform static analysis on Portable Executable malware together with malicious MS Office documents
  • Yara-Rules project, which provides compiled signatures, classified together with kept every bit upward to appointment every bit possible