Skip to content

A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files

Notifications You must be signed in to change notification settings

Almorabea/Catalyzer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 

Repository files navigation

██████╗ █████╗ ████████╗ █████╗ ██╗  ██╗   ██╗███████╗███████╗██████╗ 
██╔════╝██╔══██╗╚══██╔══╝██╔══██╗██║  ╚██╗ ██╔╝╚══███╔╝██╔════╝██╔══██╗
██║     ███████║   ██║   ███████║██║   ╚████╔╝   ███╔╝ █████╗  ██████╔╝
██║     ██╔══██║   ██║   ██╔══██║██║    ╚██╔╝   ███╔╝  ██╔══╝  ██╔══██╗
╚██████╗██║  ██║   ██║   ██║  ██║███████╗██║   ███████╗███████╗██║  ██║
 ╚═════╝╚═╝  ╚═╝   ╚═╝   ╚═╝  ╚═╝╚══════╝╚═╝   ╚══════╝╚══════╝╚═╝  ╚═╝

Description

A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files that could contain some Powershells, WMI, Vbs, and many more scripting languages inside them. It will even try to detect if the file includes some sort of executable inside it. For now, you can use it for the new wave of malicious .one or OneNote files. I hope it helps.

Usage:

python3 Catalyzer.py -h 
usage: Catalyzer.py [-h] [-f FILE] [-c CUT] [-d DUMP] [-p PASSWORD] [-fu FOLDER] [-s FORMAT]

optional arguments:
  -h, --help            show this help message and exit
  -f FILE, --file FILE  The name of the file that you wish to work with
  -c CUT, --cut CUT     Display portion of the file like hex : 00000:00100 without 0x (not required)
  -d DUMP, --dump DUMP  Dump specified portion of the working file into a new file (not required)
  -p PASSWORD, --password PASSWORD
                        Protected ZIP file password
  -fu FOLDER, --folder FOLDER
                        Analyze the full folder
  -s FORMAT, --format FORMAT
                        The format of the dump data (hex, base64)

For file analysis use the tool like this:

python3 Catalyzer.py -f /file/path

For full folder analysis use the tool like this:

python3 Catalyzer.py -fu /folder/path

For displaying a portion of a file use:

python3 Catalyzer.py -f /file/path -c StartingOffset:Endingoffset  ex : 00000000:00000100

For dumping a portion of a file to either base64 or Hex use:

python3 Catalyzer.py -f /file/path -d StartingOffset:Endingoffset  ex : 00000000:00000100 -s hex or base64

Quick Walk Through

IMAGE ALT TEXT HERE

Caveat

This is an automated tool which means it relies on signatures and things in a particular order and could be fooled by malware authors. so use it in your initial assessment and carry it out from there.

Written By

Ahmad Almorabea @almorabea

About

A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages