Unbup-dissecting-mcafee-quarantined-files
Jump to navigation
Jump to search
Description
Unbup is a toolkit useful for dissecting a McAfee quarantined file (BUP). It is composed of the 3 following files:
- UnBup.pl
- McAfee UnBup tool written in Perl because it was faster than the bash script also included
- UnBup.sh
- McAfee UnBup tool written in Bash script because it was fast to prototype (but runs slower than the Perl equivalent)
- xor.pl
- Simple bitwise xor script written in Perl
Installation
Prerequisites
$ sudo apt-get install p7zip-full
Installation of unbup
$ cd /data/tools/ $ git clone https://github.com/OpenSecurityResearch/unbup.git $ cd unbup/
Usage
Syntax
Usage: ./UnBup.sh [option] <file.bup>
Options
- -d
- details file only (no executable)
- -h
- help menu
- -s
- safe executable (extension is .ex)
Example
Let's extract a BUP file:
$ ./UnBup.sh 7dd9a0333b32c0.bup Extracting encoded files from Bup Creating the Details.txt file Extracting the binary
Following files are created:
- 800000CB.@: the virus
- Details.txt: the details file created by unbup
Here is what my Details.txt file looks like:
$ cat Details.txt
[Details]
DetectionName=TDSS.d
DetectionType=1
EngineMajor=5600
EngineMinor=1067
DATMajor=7192
DATMinor=0
DATType=2
ProductID=12106
CreationYear=2013
CreationMonth=9
CreationDay=10
CreationHour=0
CreationMinute=51
CreationSecond=59
TimeZoneName=Romance Daylight Time
TimeZoneOffset=-120
NumberOfFiles=1
NumberOfValues=5
[Value_0]
KeyRoot=HKLM
KeyName=Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
ValueName=HIDEFILEEXT
KeyIs64Bit=0
WasAdded=0
ValueType=4
ValueData=0
[Value_1]
KeyRoot=HKLM
KeyName=Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
ValueName=SUPERHIDDEN
KeyIs64Bit=0
WasAdded=0
ValueType=4
ValueData=1
[Value_2]
KeyRoot=HKLM
KeyName=Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
ValueName=SHOWSUPERHIDDEN
KeyIs64Bit=0
WasAdded=0
ValueType=4
ValueData=1
[Value_3]
KeyRoot=HKLM
KeyName=Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
ValueName=HIDDEN
KeyIs64Bit=0
WasAdded=0
ValueType=4
ValueData=1
[Value_4]
KeyRoot=HKLM
KeyName=Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
ValueName=NOFOLDEROPTIONS
KeyIs64Bit=0
WasAdded=0
ValueType=4
ValueData=0
[File_0]
ObjectType=5
OriginalName=C:\PROGRAM FILES\GOOGLE\DESKTOP\INSTALL\{6D07572D-6BCD-0CDF-F507-A0F64F465B69}\ \ \ﯹ๛\{6D07572D-6BCD-0CDF-F507-A0F64F465B69}\U\800000CB.@
WasAdded=0
[File_1]
ObjectType=5