Skip to content

BLACK-ARCHIVERS/Qu1cksc0pe

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Qu1cksc0pe

logo


All-in-One malware analysis tool for analyze Windows, Linux, OSX binaries, Document files, APK files and Archive files.

You can get:

  • What DLL files are used.
  • Functions and APIs.
  • Sections and segments.
  • URLs, IP addresses and emails.
  • Android permissions.
  • File extensions and their names.
    And so on...

Qu1cksc0pe aims to get even more information about suspicious files and helps user realize what that file is capable of.

Qu1cksc0pe Can Analyze Currently

Files Analysis Type
Windows Executables (.exe, .dll, .msi, .bin) Static, Dynamic
Linux Executables (.elf, .bin) Static, Dynamic
MacOS Executables (mach-o) Static
Android Files (.apk, .jar) Static, Dynamic(for now .apk only)
Golang Binaries (Linux) Static
Document Files Static
Archive Files (.zip, .rar, .ace) Static
PCAP Files (.pcap) Static
Powershell Scripts Static

Usage

python3 qu1cksc0pe.py --file suspicious_file --analyze

Screenshot

Screenshot

Updates

10/07/2023

  • SignatureAnalyzer module is improved. Now you can perform detection and extraction of embedded ELF executables!
  • WindowsAnalyzer module is now also perform embedded PE file detection!
new_updates.mp4

08/07/2023

  • WindowsAnalyzer module is improved.
  • Bug fixes and performance tweaks.

07/07/2023

  • Improvements on Dockerfile
  • WindowsAnalyzer and ResourceAnalyzer modules now have better detection capabilites!
  • Added new Yara rule to detect RustyStealer samples!

Available On

blackarch tsurugi

Recommended Systems

  • Parrot OS
  • Kali Linux


And similar Linux distributions...

Setup and Installation


Necessary Dependencies:

  • VirusTotal API Key => Performing VirusTotal based analysis.
  • Strings => Necessary for static analysis.
  • PyExifTool => Metadata extraction.
  • Jadx => Performing source code and resource analysis.
  • PyOneNote => OneNote document analysis.
  • Mono => Performing .Net binary analysis.
# You can simply execute the following command it will do everything for you!
bash setup.sh

# If you want to install Qu1cksc0pe on your system just execute the following commands.
bash setup.sh
sudo python3 qu1cksc0pe.py --install

# Or you can use Qu1cksc0pe from Docker!
docker build qu1cksc0pe .
docker run -it --rm -v $(pwd):/data qu1cksc0pe:latest --file /data/suspicious_file --analyze

Static Analysis

Normal analysis

Usage: python3 qu1cksc0pe.py --file suspicious_file --analyze
analyze

Resource analysis

Usage: python3 qu1cksc0pe.py --file suspicious_file --resource
resource

Hash scan

Usage: python3 qu1cksc0pe.py --file suspicious_file --hashscan
hash

Folder scan

Supported Arguments:

  • --hashscan
  • --packer

Usage: python3 qu1cksc0pe.py --folder FOLDER --hashscan
hashscan_tui

VirusTotal

Report Contents:

  • Threat Categories
  • Detections
  • CrowdSourced IDS Reports

Usage for --vtFile: python3 qu1cksc0pe.py --file suspicious_file --vtFile
total

Document scan

Usage: python3 qu1cksc0pe.py --file suspicious_document --docs
docs

Embedded File/Exploit Extraction

exploit

Archive File Scan

Usage: python3 qu1cksc0pe.py --file suspicious_archive_file --archive archiveanalysis

File signature analyzer

Usage: python3 qu1cksc0pe.py --file suspicious_file --sigcheck
sigcheck

File Carving

carving

MITRE ATT&CK Technique Extraction

Usage: python3 qu1cksc0pe.py --file suspicious_file --mitre
mitre

Programming language detection

Usage: python3 qu1cksc0pe.py --file suspicious_executable --lang
langdetect

Interactive shell

Usage: python3 qu1cksc0pe.py --console
console

Dynamic Analysis

Dynamic instrumentation with FRIDA scripts (for android applications)

Alert

You must connect a virtual device or physical device to your computer.


Usage: python3 qu1cksc0pe.py --runtime
dynamic

Binary Emulation

Alert

Binary emulator is not recommended for .NET analysis.


Usage: python3 qu1cksc0pe.py --file suspicious_file --watch
animation

References

Thanks to

For most of FRIDA scripts: https://github.com/Ch0pin/
Another scripts: https://codeshare.frida.re/browse

About

All-in-One malware analysis tool.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • YARA 93.9%
  • Python 5.1%
  • Other 1.0%