コード例 #1
0
ファイル: HashKB.py プロジェクト: jbfuzier/fileanalyzer
    def _do_work(self, submission):
        s = Session()
        r = Report(
            module=self.__ModuleName__,
            short="Short desc...",
            full="",
            submission=submission
        )
        s.add(r)
        #Do the actual work
        sql = """select sha1, md5, FileName, FileSize, ProductName, ProductVersion, Language, ApplicationType, o.OpSystemCode, OpSystemName, OpSystemVersion, o.MfgCode, MfgName
                from file f inner join Prod p on p.ProductCode=f.ProductCode inner join OS o on f.OpSystemCode=o.OpSystemCode inner join Mfg m on m.MfgCode=o.MfgCode
                where sha1=?;"""
        results = self.db.execute(sql, (submission.file.sha1.upper(),)).fetchall()

        if len(results) == 0:
            # Unknown in Db
            r.short = "Unknown File - sha1 : %s" % (submission.file.sha1)
        else:
            # Known in Hash Db
            r.short = "File known to be safe (%s match)" % (len(results))
            r.threat_level = 0
            for result in results:
                report_details = {
                    'FileName': result[2],
                    'FileSize': result[3],
                    'Product': {
                        'ProductName': result[4],
                        'ProductVersion': result[5],
                        'Language': result[6],
                        'ApplicationType': result[7],
                        'OS': {
                            'OpSystemCode': result[8],
                            'OpSystemName': result[9],
                            'OpSystemVersion': result[10],
                            'MfgCode': result[11],
                            'MfgName': result[12],
                        },
                    },
                }
                json = JSONEncoder().encode(report_details)
                section = ReportSection(
                    type='json',
                    value=json,
                    report=r
                )
                s.add(section)
        s.commit()
        #r._sa_instance_state.session.expunge(r)
        return r
コード例 #2
0
ファイル: VirusTotal.py プロジェクト: jbfuzier/fileanalyzer
 def _do_work(self, submission):
     #Do the actual work
     report = self.vt.get(submission.file.sha256)
     s = Session()
     r = Report(
         module=self.__ModuleName__,
         short="Short desc...",
         full="",
         submission=submission
     )
     s.add(r)
     new_vt_submission = False
     if report is None:
         # Unknown in VT
         r.short = "Unknown on VT"
         if self.module_config['submit_unknown']:
             report = self.vt.scan(submission.file.path, reanalyze=True)
             report.join()
             new_vt_submission = True
     try:
         assert report.done is True
         # Known in VT
         r.short = "Detection rate : %s/%s - %s" % (report.positives, report.total, report.verbose_msg)
         if new_vt_submission:
             r.short += " (First submission in VT)"
         if report.positives == 0:
             r.threat_level = 0
         elif report.positives > 5:
             r.threat_level = 100
         report_details = report._report
         json = JSONEncoder().encode(report_details)
         section = ReportSection(
             type='json',
             value=json,
             report=r
         )
         s.add(section)
     except Exception as e:
         logging.error("Could not get report from vt : %s"%e)
     s.commit()
     #r._sa_instance_state.session.expunge(r)
     return r