快速检测恶意RTF文件的POC

  • A+
所属分类:神兵利刃

以纯文本描述内容,能够保存各种格式信息,可以用写字版,Word等创建。也称富文本格式(Rich Text Format, 一般简称为RTF)是由微软公司开发的跨平台文档格式。大多数的文字处理软件都能读取和保存RTF文档。

CVE-2010-3333就是利用MicrosoftOffice RTF 分析器堆栈溢出漏洞,在网络大肆传播。国外安全爱好者Alexander Hanel日前发布了快速检测恶意RTF文件的POC。该POC利用了两种算法,据称识别率达到了97%,详见如下:

# rtf-anom-scan.py
# This is a POC for detecting malicious RTF documents. The two algorithms are simple
# The first one counts the amount of non-ASCII data in a file and the second 
# calculates the entropy of ASCII Hex blobs. Please see comments and code below for more details. 
# These can be broken pretty easy but the script currently detects 97% of the .RTF samples on 
# contagiodump.  Out of 169 random .RTFs found via Google and FTP searches there was 1 FP. The
# FP was caused possibly by Unicode text. There is no error handling. Just make sure the file is a
# .RTF and the script has read writes. 
# Written by [email protected]
# 
# usage: 
# For scanning a RTF document "rtf-anom-scan.py <bad.rtf>"
# For scanning a working dir "rtf-anom-scan.py" 

import sys
import os
import re
import string
import math 

def check_header(fi):
    # Checks for the RTF header '\rt' in the file 
    # Non-RTF files will give false positives 
      f = open(fi,'rb')
      block = f.read(0xfff)
      if '\\rt' not in block:
            print "Warning: Header not found in %s  Not an .RTF document" % fi
            print '\t',

      return
      
def H(data):
    # calculates the entropy of a block of data
    # from Ero's blog http://blog.dkbza.org/2007/05/scanning-data-for-entropy-anomalies.html
      if not data:
          return 0
      entropy = 0
      for x in range(256):
          p_x = float(data.count(chr(x)))/len(data)
          if p_x > 0:
              entropy += - p_x*math.log(p_x, 2)
      return entropy

def shell_ent(fi):
        index = 0
        block_size = 128
        tmp = 0
        inc = 0 
        with open(fi,'rb') as f:
                data = f.read(block_size)
                while(data != ''):
                    m = ''
                    # Search for blobs of data that are valid hex [a-fA-F0-9]
                    m = re.search(r'[a-fA-F0-9]{128}',data)
                    if m:
                    # ASCII HEX shellcode has consistent entropy between 3.6 and 4.0
                    # We can use the entropy to detect shellcode in files that do not
                    # contain non-ASCII values. Commonly seen in shellcode that does 
                    # not drop a file but downloads and executes a file. 
                        entropy = H(data)
                        if 4.0 > entropy > 3.6:
                                if tmp == index - 16:
                                        inc = inc + 1
                                if inc == 16:
                                        print "Suspicious: shellcode entropy block at %s in %s" % (hex(index),fi)
                                        return 
                                #print hex(index), entropy, inc
                    else:
                        inc = 0
                              
                    f.seek(index) 
                    data = f.read(block_size)
                    tmp = index 
                    index = index + 16

        return

def valid_ascii(char):
        # Check if valid ASCII 
        if char in string.printable[:-3] + '\x0d':
                return True
        else:
                return None 

def check_bytes(file_):
        # Counts the amount of non-ASCII bytes are in a file
        count = 0
        with open(file_,'rb') as f:
                byte = f.read(1)
                while byte != '':
                        if valid_ascii(byte) == None:
                            count = count + 1
                        byte = f.read(1)
                        if count > 10000:
                                print "Suspicious: large amounts of non-ASCII chars %s" % file_
                                return True
        return False

def main():
        if len(sys.argv) == 2:
                check_header(sys.argv[1])
                if check_bytes(sys.argv[1]) != True:
                        shell_ent(sys.argv[1])           
        else:
                for infile in os.listdir(os.getcwd()):
                        check_header(infile)
                        if check_bytes(infile) != True:
                                shell_ent(infile)
                        
if __name__ == '__main__':
   main()

下载地址

  • 我的微信
  • 这是我的微信扫一扫
  • weinxin
  • 我的微信公众号
  • 我的微信公众号扫一扫
  • weinxin

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: