Example #1
0
 def test_av_classification(self):
     av_class = AVClassification()
     av_class.engine_version = UNICODE_STR
     av_class.definition_version = UNICODE_STR
     av_class.classification_name = UNICODE_STR
     av_class2 = round_trip(av_class)
     self.assertEqual(av_class.engine_version, av_class2.engine_version)
     self.assertEqual(av_class.definition_version, av_class2.definition_version)
     self.assertEqual(av_class.classification_name, av_class2.classification_name)
Example #2
0
 def test_av_classification(self):
     av_class = AVClassification()
     av_class.engine_version = UNICODE_STR
     av_class.definition_version = UNICODE_STR
     av_class.classification_name = UNICODE_STR
     av_class2 = round_trip(av_class)
     self.assertEqual(av_class.engine_version, av_class2.engine_version)
     self.assertEqual(av_class.definition_version, av_class2.definition_version)
     self.assertEqual(av_class.classification_name, av_class2.classification_name)
Example #3
0
ms.malware_instance_object_attributes.properties.add_hash("076e5b2bae0b4b3a3d81c85610b95cd4")
ms.malware_instance_object_attributes.properties.add_hash("4484e08903744ceeaedd8f5e1bfc06b2c4688e76")

# Populate the Analysis with the metadata relating to the Analysis that was performed
a.method = "static"
a.type_ = "triage"
a.set_findings_bundle(b.id_)

# Set the requisite attributes on the Bundle
b.defined_subject = False
b.content_type = "static analysis tool output"

# Create the AV Classifications
av1 = AVClassification()
av1.name = "Microsoft"
av1.classification_name = "PWS:Win32/Zbot.gen!B"
av2 = AVClassification()
av2.name = "Symantec"
av2.classification_name = "Backdoor.Paproxy"
av3 = AVClassification()
av3.name = "TrendMicro"
av3.classification_name = "TSPY_ZBOT.TD"

# Add the AV classifications to the Bundle
b.add_av_classification(av1)
b.add_av_classification(av2)
b.add_av_classification(av3)

# Build up the full Package/Malware Subject/Analysis/Bundle hierarchy
p.add_malware_subject(ms)
ms.add_analysis(a)