FLASHMINGO is an analysis framework for SWF files. The tool automatically triages suspicious Flash files and guides the further analysis process, freeing precious resources in your team.
You can easily incorporate FLASHMINGO’s analysis modules into your workflow.
To this day forensic investigators and malware analysts must deal with suspicious SWF files. If history repeats itself the security threat may even become bigger beyond Flash’s end of life in 2020.
Systems will continue to support a legacy file format that is not going to be updated with security patches anymore. Automation is the best way to deal with this issue and this is where FLASHMINGO can help you.
FLASHMINGO is an analysis framework to automatically process SWF files that enables you to flag suspicious Flash samples and analyze them with minimal effort.
It integrates into various analysis workflows as a stand-alone application or a powerful library. Users can easily extend the tool’s functionality via custom Python plugins.
FLASHMINGO is designed with simplicity in mind. It reads a SWF file and creates an object (
SWFObject) representing its contents and structure. Afterwards FLASHMINGO runs a series of plugins acting on this
SWFObject and returning their values to the main program.
Below a mandatory ASCII art flow diagram:
When using FLASHMINGO as a library in your own projects, you only need to take care of two kind of objects:
- one or many
SWFObject(s), representing the sample(s)
Flashmingoobject. This acts essentially as a harness connecting plugins and
FLASHMINGO plugins are stored in their own directories under… you guessed it:
plugins When a
Flashmingo object is instantiated, it goes through this directory and process all plugins’ manifests.
Should this indicate that the plugin is active, this is registered for later use. At the code level, this means that a small
plugin_info dictionary is added to the
Plugins are invoked via the
run_plugin API with two arguments:
- the plugin’s name
Optionally, most of the plugins allow you to pass your own user data. This is plugin dependent (read the documentation) and it can be more easily be explained with an example.
The default plugin
SuspiciousNames will search all constant pools for strings containing suspicious substrings (for example: ‘overflow’, ‘spray’, ‘shell’, etc.) There is a list of common substrings already hard-coded in the plugin so that it can be used
However, you may pass a list of your own defined substrings, in this case via the
fm = Flashmingo()
print fm.run_plugin(‘DangerousAPIs’, swf=swf)
print fm.run_plugin(‘SuspiciousNames’, swf=swf, names=[‘spooky’])
FLASHMINGO ships with some useful plugins out of the box:
- template 🙂
A template plugin is provided for easy development. Extending FLASHMINGO is rather straightforward. Follow these simple steps:
- Copy the template
- Edit the manifest
- Override the
- Add your custom code
You are ready to go 🙂
FLASHMINGO as a library
- See the
docsdirectory for autogenerated documentation
- See FireEye’s blog post for an example
$ pip install sphinxcontrib-napoleon
After setting up Sphinx to build your docs, enable napoleon in the Sphinx conf.py file:
conf.py, add napoleon to the extensions list
extensions = ['sphinxcontrib.napoleon']
Use sphinx-apidoc to build your API documentation:
$ sphinx-apidoc -f -o docs/source projectdir
.rst files for Sphinx to process
$ make html
That’s it! 🙂