mandiant / flare-floss

FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
Apache License 2.0
3.22k stars 447 forks source link

oss and closed source: collect standard library strings (i.e., msvcrt) #716

Open williballenthin opened 1 year ago

mr-tz commented 1 year ago

From manual analysis of internal GP database:

mr-tz commented 1 year ago

With some parsing we can extract CRT strings (and code/function association) from .lib/.obj files.

mr-tz commented 1 year ago

for Delphi strings here's an existing database: https://github.com/dzzie/MAP/blob/master/delphi_filter.txt

mr-tz commented 1 year ago

Visual Studio contains source code (.c, .cpp, .h, .asm) as well as .lib and .obj files we can parse for run-time related strings.

williballenthin commented 1 year ago

install steps for many MSVC configurations: https://github.com/mandiant/siglib/blob/fe945b3030028fb915d5e4b0ac8aaa9514a3ae90/Dockerfile#LL54C1-L121C1

mr-tz commented 1 year ago

initial lib/obj db: https://github.com/mandiant/flare-floss/commit/722f0e3c840d4af597785573547ebc77be2858d5 parsed via JH