Files
litterbox/README.md
T

87 lines
3.1 KiB
Markdown
Raw Normal View History

2024-12-27 16:41:42 +02:00
# LitterBox
2024-12-29 10:45:36 +02:00
Your malware's favorite sandbox - where red teamers come to bury their payloads.
2024-12-29 10:46:34 +02:00
A sandbox environment designed specifically for malware development and payload testing.
2024-12-29 10:47:27 +02:00
This Web Application enables red teamers to validate evasion techniques, assess detection signatures, and test implant behavior before deployment in the field.
2024-12-29 10:46:34 +02:00
Think of it as your personal LitterBox for perfecting your tradecraft without leaving traces on production detection systems.
2024-12-29 10:47:27 +02:00
The platform provides automated analysis through an intuitive web interface, monitoring process behavior and generating comprehensive runtime analysis reports.
This ensures your payloads work as intended before execution in target environments.
2024-12-27 23:52:38 +02:00
2024-12-29 10:45:36 +02:00
2024-12-29 10:02:32 +02:00
## Core Features
2024-12-27 23:52:38 +02:00
2024-12-29 10:02:32 +02:00
### Initial Analysis
Upon file upload, LitterBox automatically performs:
- File identification and hashing (MD5, SHA256)
- Shannon entropy calculation
- File type detection and MIME analysis
- Original filename preservation
- Upload timestamp recording
2024-12-27 23:52:38 +02:00
2024-12-29 10:45:36 +02:00
### PE File Analysis
2024-12-29 10:02:32 +02:00
For executables (.exe, .dll, .sys):
- File type detection (PE32/PE32+)
- Machine type identification
- Compilation timestamp extraction
- Subsystem identification
- Entry point location
- Section enumeration
- Import DLL listing
2024-12-27 23:52:38 +02:00
2024-12-29 10:45:36 +02:00
### Office Document Analysis
2024-12-29 10:02:32 +02:00
For Office files (.docx, .xlsx, .doc, .xls, .xlsm, .docm):
- Macro detection
- VBA code analysis (if macros present)
2024-12-29 10:45:36 +02:00
## Analysis Options
2024-12-29 10:20:15 +02:00
2024-12-29 10:45:36 +02:00
### Static Analysis
2024-12-29 10:02:32 +02:00
- Scanning binaries against known detection signatures and rulesets
- Analyzing file characteristics and entropy levels for suspicious indicators
2024-12-29 10:20:15 +02:00
- Strings analyzing to locate strings that can serve as suspicious indicators
2024-12-29 10:02:32 +02:00
2024-12-29 10:45:36 +02:00
### Dynamic Analysis
Supports two modes: File, PID
2024-12-29 10:02:32 +02:00
- Scanning executable files and processes to identify suspicious behavioral characteristics
- Inspecting memory regions to detect anomalous content and hidden payloads
- Analyzing process hollowing and injection techniques for detection artifacts
2024-12-29 10:46:14 +02:00
- Monitoring sleep patterns and network behavior of beacon processes
2024-12-29 10:02:32 +02:00
- Validating integrity of PE files and detecting runtime modifications
2024-12-29 10:45:36 +02:00
## Integrated Tools
### Static Analyzers
- YARA - Pattern matching and signature detection
- CheckPlz (ThreatCheck) - AV detection testing
### Dynamic Analyzers
- YARA (memory scanning) - Runtime pattern detection
- PE-Sieve - Process and memory inspection
- Moneta - Sleep pattern analysis
- Patriot - Runtime monitoring
- Hunt-Sleeping-Beacons - Beacon behavior analysis
## API Reference
2024-12-29 10:02:32 +02:00
### File Operations
2024-12-29 10:45:36 +02:00
```http
POST /upload # Upload files for analysis
GET /analyze/static/<hash> # Static file analysis
POST /analyze/dynamic/<hash> # Dynamic file analysis
POST /analyze/dynamic/<pid> # Process analysis
```
2024-12-29 10:02:32 +02:00
### System Management
2024-12-29 10:45:36 +02:00
```http
GET /health # System health and tool status check
POST /cleanup # Clean analysis artifacts and uploads
POST /validate/<pid> # Validate process accessibility
```
2024-12-29 10:20:15 +02:00
## Configuration
The `config.yml` file controls:
- Upload directory and allowed extensions
- Analysis tool paths and options
- YARA rule locations
- Analysis timeouts and limits