Skip to content
/ mace Public

Automated extration of malware configuration, focusing on C2 communication

Notifications You must be signed in to change notification settings

0x6e66/mace

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

MACE (MAlware Configuration Extrator)

Description

This project aims to provide functionality for the automated extraction of malware configuration from samples. The extracted information is focused on the C2 communication of the sample. This includes hardcoded domains and IPs and parameters of used Domain Generation Algorithms.

Supported malware families

Note: Automatic classification of malware families is not yet implemented

Example usage

Analyzing the DMSniff sample f4be1b8d67e33c11789d151d288130254d346ecc0f4738a12ce3a34d86ec646d

$ cargo run -- direct -f dm-sniff sample.exe | jq
[
  {
    "header": {
      "sha256_of_sample": "f4be1b8d67e33c11789d151d288130254d346ecc0f4738a12ce3a34d86ec646d",
      "datetime_of_extraction": "2025-02-24T10:58:57.196479987+01:00",
      "extractor_used": "DMSniff"
    },
    "data": {
      "hardcoded_ips": [],
      "hardcoded_domains": [],
      "dga_parameters": {
        "number_sequences": {
          "primes": [
            5,
            3,
            1,
            7,
            13,
            11
          ]
        },
        "string_sequences": {
          "tlds": [
            ".com",
            ".org",
            ".net",
            ".ru",
            ".in"
          ]
        },
        "strings": {
          "prefix": "st"
        },
        "magic_numbers": {
          "counter": 50
        }
      }
    }
  }
]

Todo

  • Implement automated classification of malware families

About

Automated extration of malware configuration, focusing on C2 communication

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published