VolatilityBot – An Automated Memory Analyzer For Malware Samples And Memory Dumps
VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation. Not only does it automatically extract the executable (exe), but it also fetches all new processes created in memory, code injections, strings, IP addresses, etc.
Part of the work security researchers have to go through when they study new malware or wish to analyse suspicious executables is to extract the binary file and all the different injections and strings decrypted during the malware’s execution.
In the new version of VolatilityBot, a new feature is automated analysis of memory dumps, using heuristics and YARA/Clam AV Scanners (Clam scan coming soon). This feature is useful for memory analysis at scale. Usually, this initial process is done manually, either of a malware sample, or a memory dump and it can be lengthy and tedious.
Automated analysis of malware samples (Based on diff-ing between clean memory image and infected one )
- Extraction of injected code
- Dump of new processes
- Yara scan, static analysis, string extraction, etc. on all outputs
Automated heuristic analysis of memory dumps
- Detect anomallies using heuristics and dump the relevant code
- Yara scan, static analysis, string extraction, etc. on all outputs.
Prepare the VM (Currently only vmware)
Create a new virtual machine, with Windows XP up to windows 10 x64.
Make sure the machine has windows defender and FW disabled, and has a static IP
Install python 3.5
Create c:\temp folder, or change the destination folder in config
Copy the agent.py from Utils and launch it (you can execute it without the console using pythonw.exe)
Take a snapshot of the VM
repeat steps 1-6 for as many VMs as you want
Configuring the host
Edit the required parameters, as instructed in the conf/conf.py file
Execute db_builder.py - in order to create the database
Execute gi_builder.py - in order to build the golden images for all active VMs
Analyze a memory dump using heuristics, and dump output to folder
VolatilityBot.py -m --dump -f /Users/Martin/Downloads/stuxnet.vmem
Submit an executable and analyze it using Volatility:
VolatilityBot.py -f <Sample Path>