how to use - JPCERTCC/MalConfScan-with-Cuckoo GitHub Wiki
Run your Cuckoo server and submit the sample you want to analyze.
$ cuckoo --cwd /opt/cuckoo
$ cuckoo --cwd /opt/cuckoo web runserver 0.0.0.0:7777
Submit the sample from the web interface.
$ cuckoo submit /path/to/binary
For more detail, please check the official document.
Submit an Analysis | Cuckoo Sandbox Docs
If MalConfScan found something in the memory, it will show some results.
- Click the VM Memory Dump icon.
- Click the MalConfScan tab.
You could find the analysis result in the Cuckoo Working Directory.
/opt/cuckoo/storage/analyses/[analysis number]/report/report.json
Following is a sample dumped data of TSCookie in report.json
.
...snip...
"malconfscan": {
"data": [
{
"malconf": [
[
{"Server 0": "jpcert.ignorelist.com"},
{"Server 0 (port 1)": "443"},
{"Server 0 (port 2)": "0"},
{"Server 1": "jpcerts.jpcertinfo.com"},
{"Server 1 (port 1)": "443"},
{"Server 1 (port 2)": "80"},
{"Server 2": "45.76.102.145"},
{"Server 2 (port 1)": "443"},
{"Server 2 (port 2)": "0"},
{"ID": "A\u0000v\u00003\u0000-\u0000l"},
{"KEY": "2455402077"},
{"Sleep time": "56"}
]
],
"vad_base_addr": "0x03997696",
"process_name": "64174c53199de5242b59a3bbe1b326de.exe",
"process_id": "2764",
"malware_name": "TSCookie",
"size": "0x00065536"
}
]
},
...snip...