doomedraven / VirusTotalApi

VirusTotal Full api
MIT License
290 stars 85 forks source link

Follow up on #39 still get error with utf-8 #40

Closed KlausItem closed 5 years ago

KlausItem commented 5 years ago

THX for beeing so fast ;-)

But.... there is a new one. See ....

internet@internet:~/Schreibtisch/VirusTotalApi-master/vt$ python vt.py -s db349b97c37d22f5ea1d1841e3c89eb4 -v /home/internet/.local/lib/python2.7/site-packages/requests/init.py:83: RequestsDependencyWarning: Old version of cryptography ([1, 2, 3]) may cause slowdown. warnings.warn(warning, RequestsDependencyWarning)

[+] Basic

     Name                                               Value                                    

===================================================================================================== size 3723264
authentihash 1646cad4fe91337460de0d4c2c5451095023e74bdab331642aaca12647b72f46
sha1 e889544aff85ffaf8b0d0da705105dee7c97fe26
magic PE32 executable for MS Windows (GUI) Intel 80386 32-bit
vhash 036046651d6570b8z201cpz31zd025z
last_analysis_date 2019-04-24 03:28:36
meaningful_name lhdfrgui.exe
times_submitted 170
last_submission_date 2019-04-10 23:17:13
creation_date 2010-11-20 10:03:08
unique_sources 127
first_submission_date 2017-05-12 10:57:51
type_description Win32 EXE
reputation -1623
last_modification_date 2019-05-01 12:11:37
type_tag peexe
ssdeep 98304:wDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3R:wDqPe1Cxcxk3ZAEUadzR8yc4gB sha256 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c
total_votes {u'harmless': 1, u'malicious': 82}
md5 db349b97c37d22f5ea1d1841e3c89eb4

[+] Names lhdfrgui.exe C:\Users\Flowzn\Desktop\wannacry.exe 24d004a104d4d540_mssecsvc.exe 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.exe ColetaniaPlayboy.exe content_96594.exe M:/ransom/24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c wannacry__ransomware (37) WannaCry_mssecsvc.exe wcry1.exe VirusShare_db349b97c37d22f5ea1d1841e3c89eb4 mssecsvc.exe mssecsvckkk.exe WannaCry.exe 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c.bin 24d0.vir.DNvir localfile~ wannacry2.bin Ransomware(WannaCry01).exe /home/joonwoo/Desktop/malwr/malware4/db349b97c37d22f5ea1d1841e3c89eb4 WannaWanna.docx WanaCrypt0r_2.0_2.exe mssecsvcexe №2.exe D6C60B8F22F89CBD1262C0AA7AE240577A82002FB149E9127D4EDF775A25ABCDA4E585B6113E79AB4A24BB65F4280532529C2F06F7FFE4D5DB45C0CAF74FEA38.bin Win32 Exploit.CVE-2017-0147.A.exe mssecsvc.exe c.bin db349b97c37d22f5ea1d1841e3c89eb4.virus Exploit.dll wcryptv2.exe ixP8Fx8n.exe db349b97c37d22f5ea1d1841e3c89eb4mssecsvc.exe test.exe db349b97c37d22f5ea1d1841e3c89eb4.exe ransomware06.exe c:_WorkPlace\todo\24D004A104D4D54034DBCFFC2A4B19A11F39008A575AA614EA04703480B1022C.dat mssecsvc.exe.vir trz5289.tmp mssecsvc.$$$ mssecsvc.ex %systemroot%\mssecsvc.exe C:\Windows\mssecsvc.exe c:\windows\mssecsvc.exe C:/WINDOWS/mssecsvc.exe c://windows//mssecsvc.exe C:\Users\omiguelr\Desktop\odbg110\mssecsvckkk.exe C:\Users\test\Desktop\mw\10\mssecsvc.exe

[+] Tags peexe cve-2017-0147 exploit

[+] Signature info Traceback (most recent call last): File "vt.py", line 3457, in main() File "vt.py", line 3417, in main vt.getReport(options) File "vt.py", line 694, in getReport self._parse_aux(jdata['data']['attributes'], kwargs) File "vt.py", line 596, in _parse_aux self._print_complex_dict(block, key, **{'email_template':True}) File "vt.py", line 498, in _print_complex_dict key_s, key_v = get_sizes(jdata[key]) File "vt.py", line 111, in get_sizes value_s = max([len(str(value)) for value in list(dictionary.values())]) UnicodeEncodeError: 'ascii' codec can't encode character u'\xae' in position 9: ordinal not in range(128)

Originally posted by @KlausItem in https://github.com/doomedraven/VirusTotalApi/issues/39#issuecomment-488634004

doomedraven commented 5 years ago

that is fixed

doomedraven commented 5 years ago

check latest commit

KlausItem commented 5 years ago

Perfect... U are a Rockstar ;-)

doomedraven commented 5 years ago

thanks a lot for all reporting, one day i will write unittests, maybe :D