Documentation ¶
Overview ¶
Package analysis is responsable for the malware execution orchestration.
Index ¶
Constants ¶
View Source
const (
TimeFormat string = "02-01-2006 15:04:05 MST"
)
Variables ¶
View Source
var (
ErrFileEmpty = errors.New("log file is empty") // ErrFileEmpty occurs when the driver log file is empty.
)
Functions ¶
This section is empty.
Types ¶
type Analysis ¶
type Analysis struct { Report *Report // Report represents the final artifact of the analysis process. // contains filtered or unexported fields }
type Environment ¶
type Environment struct {
// contains filtered or unexported fields
}
type FileMetadata ¶
type FileMetadata struct { Filename string `json:"filename"` Extension string `json:"extension"` MimeType string `json:"mimetype"` Size int64 `json:"size"` LastModified string `json:"last_modified"` MD5Sum string `json:"md5sum"` SHA1Sum string `json:"sha1sum"` SHA256Sum string `json:"sha256sum"` }
Malware sample file information.
type ProcessMetadata ¶
type ProcessMetadata struct { WindowsRegisters []WindowsRegisters `json:"windows_registers"` WindowsFS []WindowsFileSystem `json:"windows_fs"` WindowsBinariesLoaded []WindowsBinariesLoaded `json:"windows_binaries_loaded"` WindowsProcess []WindowsProcess `json:"windows_process"` }
Malware process information
type Report ¶
type Report struct { Request RequestMetadata `json:"request_metadata"` Process ProcessMetadata `json:"process_metadata"` }
Report represents the final artifact of the analysis process.
type RequestMetadata ¶
type RequestMetadata struct { Status string `json:"status"` ID string `json:"id"` DriverVersion string `json:"driver_version"` TemplateID int `json:"template_id"` StartTime string `json:"start_time"` EndTime string `json:"end_time"` Log []string `json:"log"` Error string `json:"error"` File FileMetadata `json:"file_metadata"` }
type WindowsBinariesLoaded ¶
type WindowsFileSystem ¶
type WindowsFileSystem struct { Date string `json:"date"` Time string `json:"time"` InfoType string `json:"info_type"` MJFunc string `json:"mj_func"` PID string `json:"pid"` TID string `json:"tid"` SID string `json:"sid"` TokenType string `json:"token_type"` Privileges []Privilege `json:"privileges"` ElevationStatus string `json:"elevation_status"` ImageName string `json:"image_name"` Path string `json:"path"` FileName string `json:"file_name"` }
type WindowsProcess ¶
type WindowsProcess struct { Date string `json:"date"` Time string `json:"time"` InfoType string `json:"info_type"` PPID string `json:"ppid"` PID string `json:"pid"` Operation string `json:"operation"` TokenType string `json:"token_type"` Privileges []Privilege `json:"privileges"` ElevationStatus string `json:"elevation_status"` ParentName string `json:"parent_name"` ChildName string `json:"child_name"` }
Click to show internal directories.
Click to hide internal directories.