Introducing Morpheus IOC Scanner — a reliable and advanced tool for detecting and analyzing potentially malicious files, including ransomware and Indicators of Compromise (IOCs). Designed with precision, Morpheus leverages custom-built rules alongside enterprise-grade YARA integrations to extract detailed file insights and identify complex malware threats. Built to support enterprise-grade detection, it provides robust analysis capabilities to help you stay ahead of cyber threats with confidence.
Custom Detection for KRYPT0S Ransomware:
Includes tailored detection for the KRYPT0S ransomware POC. This project can be viewed here.
High-Quality YARA Rules:
Uses enterprise-grade YARA rules to detect malware, allowing thorough and reliable scanning.
File Information Extraction:
Extract detailed file-related information through custom-made rules designed for comprehensive file analysis.
Up to Date Yara Rules:
Morpheus utilizes a custom script to instantly fetch new Yara rules whenever updates occur in the GitHub repository.
VirusTotal Integration:
Optionally integrate with VirusTotal to leverage multi-engine analysis for deeper insight into potential threats.
Cross Compatability:
Run Morpheus in the comfort of your own machine due to its cross compatability nature. Ensuring it can run on both Windows and Linux machines.
High Speed Analysis:
Using dynamic multithreading, Morpheus efficiently accelerates scanning across files of any size, leveraging its extensive database to quickly detect matches and optimize processing speed.
Post Analysis PDF Document:
Morpheus would be able to compile all results into a compiled PDF document, for further analysis and presentation.
AI Final Verdict: MORPHEUS_IQ delivers a comprehensive verdict on the file and its malware analysis, offering detailed feedback and insights based on signature detection and analysis results.
Morpheus offers a range of powerful features that make it an essential tool for malware analysis. Here’s what sets it apart:
Morpheus’s goal is to comprehensively address threats throughout every phase of the attack lifecycle, defend like there is no tomorrow.
Submit a file or hash to VirusTotal for an in-depth analysis using multiple antivirus engines. This mode provides comprehensive information about potential threats using VirusTotal's extensive database.
Provides detailed output, including insights from security vendors, community feedback, and more. Limitations include API rate limiting (though the default limit is relatively high) and no results for files that haven't been previously analyzed in the VirusTotal database.
Usage in Morpheus
Perform a static scan using YARA rules and Pefile to identify common malicious patterns. This method can quickly flag suspicious files, including the custom detection of KRYPT0S, a ransomware developed by me as a proof of concept (POC).
Provides enhanced features compared to the "VirusTotal Scan" option, including PDF output, AI integration, and access to an extensive signature database capable of detecting files not registered with VirusTotal. However, it may be prone to instability due to heavy dependencies and pre-setup requirements. While Morpheus undergoes rigorous testing, results may vary depending on the system.
Usage in Morpheus
To get started with Morpheus IOC Scanner, follow these steps:
Install the required Python libraries:
pip install -r requirements.txt
python3 setup.py
Note: Running setup.py requires Git to install additional rules. If Git isn’t installed, Morpheus will attempt to install it for you, though it's recommended to have Git pre-installed to avoid potential errors.
Once setup is complete, you can run the main file:
python3 morpheus_scanner.py
Periodically run the database_updater.py
script to fetch the latest YARA rules and ensure your database is up-to-date with the latest versions from the GitHub repositories.
python3 database_updater.py
If you wish to switch to a more comprehensive or lighter YARA ruleset, such as the Fortress Edition or Nano Edition, simply run the setup.py
script again. This will handle the deletion of old files and automatically set up the new ruleset for you.
Running the setup script will seamlessly update the database and ensure you are using the desired edition of Morpheus.
Below are error messages that can be outputted from Morpheus:
Directory Error : [-] Ensure you're in the '/Main Files' Morpheus directory before continuing! Program Aborted.
The error above indicates that Morpheus is not being run from its "Main Files" folder. This folder serves as the primary directory for Morpheus. Running the program from any other directory will trigger this error because Morpheus relies on dynamic path extraction relative to the current working directory. If executed from a different directory, file paths will become invalid. To resolve this, ensure you run Morpheus from the "morpheus_IOC_scanner/Main Files" directory.
Git Usage Error : Git may not have been installed correctly, the program is unable to access the command. This may be due to a system error during installation.
This is primarily a Windows-specific error that occurs when Git is not installed. Morpheus attempts to install Git using "winget" (a Windows package manager). While this usually succeeds, the terminal may need to be restarted for the environmental variables associated with Git to take effect. If this error appears, restart the terminal and re-run Morpheus. If the issue persists, manually install Git from its official website to resolve the problem.
Git RPC Error : RPC Failed ...
Morpheus is a large repository containing numerous YARA rules, which can require significant bandwidth to download via Git. In cases where your Wi-Fi signal is slow or unstable. If you encounter this issue, try cloning Morpheus using the following method to reduce network load by downloading only the latest items in the repository.
To resolve this issue, try the following: git clone --depth 1 https://github.com/phantom0004/morpheus_IOC_scanner
VirusTotal Resource not Found : The requested resource (file or URL) was not found in VirusTotal's database.
This error occurs when the file, URL, or hash isn't recognized by VirusTotal, as it must already exist in their database to display results. If no prior scans exist, detailed information won't be available. Sometimes, the API may return an error or no response, which could indicate an API issue rather than the absence of an entry. To resolve this, try submitting a hash (MD5, SHA-256, or SHA-1) instead of the file itself for potentially better results.
Morpheus V2 was tested by scanning an actual WannaCry sample. As demonstrated below, the tool successfully extracts key details about the file, providing valuable insights through its AI-generated verdict. Additionally, the VirusTotal API integration enhances the analysis by offering deeper insights into the sample. Finally, the results can be compiled into a PDF, enabling comprehensive documentation for further review and analysis.