Go to file
Roberto Abdelkader Martínez Pérez 78eff7982e Merge branch 'unattended_and_retval' into unattended_and_retval2 2014-05-02 13:37:58 +02:00
pafish Merge branch 'unattended_and_retval' into unattended_and_retval2 2014-05-02 13:37:58 +02:00
screenshots Added v02 screenshots 2012-10-28 19:06:09 +01:00
CHANGELOG Bump v03 2014-01-01 14:00:09 +01:00
LICENSE.txt Added LICENSE.txt 2013-03-23 18:03:28 +01:00
README.md Minor change in README 2014-01-01 14:02:27 +01:00
pafish.exe Added command line option `-q` that disables the last `getchar()` for unattended analysis. 2014-05-01 19:47:45 +02:00

README.md

Pafish

(Paranoid Fish)

Pafish is a demo tool that performs some anti(debugger/VM/sandbox) tricks. Most of them are often used by malware to avoid debugging and dynamic analysis.

The project is open source, you can read the code of all anti-analysis checks. You can also download the compiled executable (or compile it by yourself) and reverse engineer it, which is quite recommended.

It is licensed under GNU/GPL version 3.

Scope

Note that the aim of the project is not to implement complex VM detections.

The objective of this project is to collect usual tricks seen in malware samples. This allows us to study it, and test if our analysis environments are properly implemented.

Examples of execution (v025 all of them):

ThreatExpert
Cuckoo Sandbox
Anubis
CWSandbox
Comodo

Certificate

All releases from v024 will be shipped signed by the original development team. Consider everything without our certificate as unofficial, you can check it against the certificates present in the binaries from this repository.

DLL

Some software projects may be interested in use some of the functions pafish brings. To make it possible, pafish-dll is a side project to maintain a DLL with all the features present on pafish.

Build

Pafish is written in C and developed with wxDev-C++.

Author

Alberto Ortega (@a0rtega - profile)

Contributions

Feel free to send me malware samples or more tricks to add. GPG ID: 6A06CF5A