pafish/README.md

36 lines
1.5 KiB
Markdown
Raw Permalink Normal View History

2015-01-01 19:17:06 +03:00
2012-07-01 16:55:09 +04:00
# Pafish
## (Paranoid Fish)
2012-07-01 15:06:41 +04:00
2012-07-01 16:55:09 +04:00
Pafish is a demo tool that performs some anti(debugger/VM/sandbox) tricks. Most of them are often used by malware to avoid debugging and dynamic analysis.
2012-12-19 20:33:45 +04:00
The project is open source, you can read the code of all anti-analysis checks. You can also [download](https://github.com/a0rtega/pafish/raw/master/pafish.exe) the compiled executable (or compile it by yourself) and reverse engineer it, which is quite recommended.
2012-07-01 16:55:09 +04:00
It is licensed under GNU/GPL version 3.
2012-07-01 16:55:09 +04:00
# Scope
Note that the aim of the project is not to implement complex VM detections.
2015-01-01 19:17:06 +03:00
The objective of this project is to collect usual tricks seen in malware samples. This allows us to study them, and test if our analysis environments are properly implemented.
2012-10-28 22:11:24 +04:00
Examples of execution (v025 all of them):
[ThreatExpert](http://www.threatexpert.com/report.aspx?md5=7662cb4b1abc4ccb30b3682acc3dae24)
[Cuckoo Sandbox](https://malwr.com/analysis/NTI1YjgyM2IxNzk3NDI3YjkyYzNkN2Y3NGE1NWFmZjE/)
[Anubis](http://anubis.iseclab.org/?action=result&task_id=1f3d255d33107d034adcfcd3f2b1fb52c&format=html)
[Comodo](http://camas.comodo.com/cgi-bin/submit?file=bbf9b5b80121a82cf93a67d86c23a8bd9b18313414fe49c30054fb4348e65547)
2012-07-01 16:55:09 +04:00
2012-07-03 21:50:37 +04:00
# Build
2015-01-01 19:17:06 +03:00
Pafish is written in C and built with pure MinGW (make + gcc).
2012-07-03 21:50:37 +04:00
2012-07-01 16:55:09 +04:00
# Author
2014-01-01 17:02:27 +04:00
Alberto Ortega (@[a0rtega](https://twitter.com/#!/a0rtega) - [profile](http://aortega.badtrace.com))
2012-07-01 16:55:09 +04:00
# Contributions
2015-01-01 19:17:06 +03:00
Feel free to send me malware samples or more tricks to add. GPG ID: [6A06CF5A](https://keybase.io/alberto/key.asc)