Skip to content

born2c0de/DataTransformer

Repository files navigation

DataTransformer - DT

DT is a command-line, static-analysis tool intended for malware researchers and reverse engineers. It contains routines for various decompression and decryption algorithms typically used by malware.

It is licensed under GNU/GPL version 3.

Scope

Note that the aim of the project is not to implement all compression and encryption algorithms.

The objective is to document algorithms used for obfuscation and data-hiding seen in malware samples. The idea is to have one tool capable of statically revealing crypted or compressed data within a malware sample instead of needing a collection of tools to decrypt data or debugging samples to arrive at the decrypted data. Individual operations can be combined and sent to DT (for example: Rolling XOR + ADD).

Example Use Cases:

TODO

Supported Algorithms

  • Cut (Extract selected bytes)
  • Reverse (Reverses selected bytes)
  • UnHexlify + Hexlify (Converts raw bytes into string representations of its hex equivalent)
  • Base64
  • CRC32
  • MD5
  • SHA1
  • SHA256
  • SHA512
  • AES (ECB mode)
  • AES (CBC mode)
  • GZip
  • APLIB
  • RC4
  • Modified RC4 (Spritz)
  • LZNT
  • TEA
  • ZLIB
  • Simple ADD/SUB
  • Rolling ADD/SUB
  • Simple XOR (w/ N-byte key)
  • Rolling XOR (w/ N-byte key)
  • Rolling XOR (w/ N-byte key)
  • RoL/RoR
  • DES (ECB mode)
  • TripleDES (ECB mode)
  • DES (CBC mode)
  • DES (CFB mode)
  • .NET SmartAssembly Packer Resource Decryptor

Build

DT is written in Python 2.7.9+.

Dependencies (TODO:)

External Libraries/Code Used

Contributions

Feel free to send pull requests and bug reports.

About

Command-line decryption tool for static malware analysis.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages