[Blackhat Europe tool] RansomCoin: extract cryptocoin addresses and other indicators of compromise from binaries
Extracting metadata and hardcoded Indicators of Compromise from ransomware, in a scalable, efficient, way with cuckoo integrations. Ideally, is it run during cuckoo dynamic analysis, but can also be used for static analysis on large collections of ransomware. Designed to be fast, with low false positive for cryptocurrency addresses. Limited false positives for emails, urls, onions, and domains (which is pretty hard to make perfect).
In short, this is fast and easy initial triage if you only want monetization vectors.
Please ensure you have Python3 installed.
In a Linux Virtual Machine
git clone https://github.com/Concinnity-Risks/RansomCoinPublic.git
From the tools folder:
sudo apt-get install build-essential libpoppler-cpp-dev pkg-config python-dev python3-tlsh
python3 -m pip install -r requirements.txt
Note: If you get an error saying No module named pip, try running
sudo apt-get install python3-pip
The following commands can be run from the “Tools” folder to analyze malware samples located in this directory. This will run the code across all files in the directory and provide feedback on the estimated time to completion via TQDM. You will need write access for a file called Ransomware.csv in the directory you are working in (which contains the results). It should be possible to run the code across read-only malware files though, so only Ransomware.csv need write access.
After running coinlector.py the results are output to a file in the same directory called Ransomware.csv
View the results by running
Currently, we are testing for:
- Bitcoin Addresses (BTC)
- Bitcoin Cash Addresses (BCH)
- Monero Addresses (XMR)
- Bitcoin Private Keys
- Ethereum addresses (ETH)
- Ripple addresses (XRP)
- LTC addresses (LTC)
- DOGECOIN addresses (DOGE)
- NEO addresses (NEO)
- DASH addresses (DASH)
- Domains (Address)
- Email Addresses (Email)
- Onion Addresses (Address)
View URLs, email addresses, and cryptocurrency addresses by running the following grep commands.
less Ransomware.csv | grep URLless Ransomware.csv | grep Emailless Ransomware.csv | grep Address
Grep for Monero addresses by running
less Ransomware.csv | grep XMR
The same command can be used to search for other cryptocurrencies using the abbreviations in the list above.
tempuscoin.py outputs a list of timestamped ransom transactions. The file TemporalRansoms.csv is created showing the sending and receiving Bitcoin addresses, the amount in BTC and its equivalent value in EUR, USD at the time of the transaction.
View the results by running.
This code will probably need to be altered to be made usable with your own MISP instance. It uses PyMISP to create events from the Ransomware.csv file, and groups of events share the same name. The default is to create events that are not published, and then to add details by hand before publishing. YMMV.
Copyright (C) 2018