MalEvol is an analysis pipeline that accepts a web-borne malware infection network capture (.PCAP or .PCAPNG) and dissects it by analyzing HTTP conversations. Given a PCAP of a malware infection (suspicious traffic), MalEvol leverages the CapTipper HTTP replay engine to sift through HTTP conversation transactions so as to enable security analysts quickly identify potential threats (e.g., exploit kits, ransomware) across multiple dimensions such as redirections, fingerpringing, and actual exploitation indicators and participants (e.g., malware payload servers).
For potentially malicious artifacts it identifies, MalEvol leverages real-time detection results from VirusTotal to score each artifact for maliciousness. In addition, MalEvol also automatically exracts IOCs from the given infection capture and searches for them in APT reports to correlate IOCs in the infection traffic under analysis and APT artifacts released over the years.
MalEvol has the following major analysis components which we call gadgets:
- Enticement source identification
- Redirection chain extraction
- Fingerprinting
- Exploitation details
- Geo-location of participating hosts/IP addresses
- Python 3: Used to run MalEvol.py
pip3 install -r requirements.txt
- Python 2: Used to invoke CapTipper.py from within MalEvol
- Make sure that the python2 command in your variable environment is "python2"
- Clone this repo to your local machine using
git clone https://github.com/um-dsp/MalEvol.git
- Under the MalEvol directory, create two directories named "dumps" and "reports"
- Drop your .pcap or .pcapng files in the "pcaps" directory
- Execute
python MalEvol.py <path/to/your-pcap-file>
(python3)
-
Please note that MalEvol is not intended for production/commercial purpose, but rather for educational and research only.
-
Since MalEvol analyzes potential malicious objects, in order to smoothly run it, you need to disable any real-time anti-malware protection you have installed or your OS provides.
This example shows the geo-location analysis results of the redirection chain.
run
python MalEvol.py pcap21.pcap
MalEvol was developed at the Data-Driven Security & Privacy Lab (DSPLab) at the University of Michigan, Dearborn. May you have questions, please contact the Lead Developer, Abderrahmen Amich ([email protected]).