Tool introduction: Loki's IOCs detection and Pesieve's memory injection detection

LOKI control line commands

Insert picture description here

Command options Function parameter
-h Show this help message and exit
-p Path to scan
-s (Kilobytes) Maximum file size in KB (default is 5000 KB)
-l Log file
-r Remote syslog system
-t Remote syslog port
-a Alarm score for alarm level
-w Alarm score for warning level
-n Notification score for notification level
–printall Print all scanned documents
–allreasons Print all the reasons that led to the score
–noprocscan Skip process scan
–Nofilescan Skip file scanning
–nolevcheck Skip Levenshtein distance check
–scriptanalysis Activation script analysis (beta)
–rootkit Skip rootkit check
–No indicator Do not show progress indicator
–Reginfs Check Regin virtual file system
–dontwait No need to wait for exit
–intense Intensive scanning mode (also scans unknown file types and all extensions)
–csv Write CSV log format to STDOUT (machine processing)
–onlyrelevant Only print warnings or alarms
–nolog Do not write local log files
–update Update the signature database from the "signature database" subdirectory
–debug Debug information output
–maxworkingset MAXWORKINGSET The maximum working set size of the scanning process (in MB, the default is 100 MB)
–syslogtcp Use TCP instead of UDP for syslog logging
-Log folder Log folder
–Nopesieve Do not perform pe-sieve scan
–pesieveshellc Perform a pe-sieve shellcode scan
–Nolisten Don't show listening connections
–excludeprocess Specify the executable file name to be excluded from scanning, can be used multiple times

My position on loki:An IOCs scanner that can detect whether the current host has APT samples in real time. You can also affectionately call it a THOR advertising product. There are some yara rules that can be used for free prostitution!

PE-SIEVE.EXE control line command

/ pid <target_pid>:设置目标进程的PID。
(十进制或前缀为“ 0x”的十六进制)

可选的扫描选项:
/ iat <*scan_mode>:扫描IAT挂钩。
扫描模式:
0-无:不扫描IAT挂钩(默认)
1-过滤:扫描IAT挂钩,过滤掉系统挂钩
2-未过滤:扫描IAT挂钩,报告所有

/ shellc:检测shellcode注入。 (默认情况下,它仅检测PE)。

/data <*data_scan_mode>:设置是否应扫描不可执行的页。
0-无:不扫描不可执行的页
1-.NET:在.NET应用程序中扫描不可执行的页
2-如果没有DEP:如果DEP被禁用(或者是.NET),则扫描非执行程序页
3-始终扫描:无条件扫描不可执行的页

/ mfilter <* mfilter_id>:过滤扫描的模块。
0-无过滤器(作为扫描仪)
1-只适用于32位
2-是适用于64位
3-全部可访问(默认)

/ mignore <模块名称>:指定模块名称(以’;'分隔),不会进行扫描。
示例:kernel32.dll; user32.dll

/ refl:在扫描之前进行过程反射。

/ dnet <* dotnet_policy>:设置用于扫描托管进程(.NET)的策略。
0-无:将托管进程与本地进程一样
1-跳过映射不匹配(仅在.NET模块中)
2-跳过shellcode(在托管进程的所有模块中)
3-跳过挂钩的模块(在托管进程内的所有模块中)
4-跳过以上所有内容(映射,shellcode,钩子)

DUMP转储选项
/ imp <* imprec_mode>:设置应以哪种方式恢复导入表。
0-无:不恢复导入表(默认)
1-尝试自动检测最合适的模式
2-恢复部分损坏或被擦除的导入表
3-根据找到的IAT从头开始构建导入表

/ dmode <*转储模式>:设置检测到的PE文件应以哪种模式转储。
0-自动检测(默认)
1-虚拟(因为它在内存中,没有取消映射)
2-未映射(使用节的原始标题转换为原始)
3-重新对齐的原始格式(转换后的原始格式与虚拟格式相同)

输出选项
/ ofilter <* ofilter_id>:过滤转储的输出。
0-无过滤器:转储所有内容(默认)
1-不要转储修改后的PE,但要保存报告
2-不要转储任何文件

/quiet: Only print brief summary information. During scanning, stdout will not be logged in.
/json: The summary output is in JSON report format.
/ minidmp: Create minidmp of the entire suspicious process.
/ dir <output directory>: Set the output root directory (default: current directory).
/help: Print this help.
/ version: Print the version number.

Insert picture description here
Common commands: run cmd and execute commands with administrator privileges

Pe-sieve64.exe /pid 996 /shellc /json /dir c:\test

The main purpose:The complete PE structure of the dll that can be quickly DUMP injected into the process can be used to unpack

Guess you like

Origin blog.csdn.net/qq_43312649/article/details/112307031