MalConfScan is a Volatility plugin extracts configuration data of known malware. Volatility is an open-source memory forensics framework for incident response and malware analysis. This tool searches for malware in memory images and dumps configuration data. In addition, this tool has a function to list strings to which malicious code refers.
Supported Malware Families
It can dump the following malware configuration data, decoded strings or DGA domains:
Also Read – Penta : Open Source All-In-One CLI Tool To Automate Pentesting
It has a function to list strings to which malicious code refers. Configuration data is usually encoded by malware. Malware writes decoded configuration data to memory, it may be in memory. This feature may list decoded configuration data.
Install packages
If you do not have Yara, please check this page and install it.
Volatility only supports Python2. If you do not have Python2, please install it.
$ wget http://downloads.volatilityfoundation.org/releases/2.6/volatility-2.6.zip
$ unzip volatility-2.6.zip
or cloning from Github.
$ git clone https://github.com/volatilityfoundation/volatility.git
$ git clone https://github.com/JPCERTCC/MalConfScan.git
$ pip install -r MalConfScan/requirements.txt
$ cd MalConfScan
$ cp -R malconfscan.py utils yara [Extract Volatility Folder]/volatility/plugin/malware
For Volatility on Linux, please refer to the Volatility wiki.
It has two functions malconfscan and malstrscan.
Export known malware configuration
$ python vol.py malconfscan -f images.mem –profile=Win7SP1x64
$ python vol.py malstrscan -f images.mem –profile=Win7SP1x64
Malware configuration data can be dumped automatically by adding it to Cuckoo Sandbox. If you need more details on Cuckoo and the tool integration, please check MalConfScan with Cuckoo.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…