Unbup-dissecting-mcafee-quarantined-files
Jump to navigation
Jump to search
Description
Unbup is a toolkit useful for dissecting a McAfee quarantined file (BUP). It is composed of the 3 following files:
- UnBup.pl
- McAfee UnBup tool written in Perl because it was faster than the bash script also included
- UnBup.sh
- McAfee UnBup tool written in Bash script because it was fast to prototype (but runs slower than the Perl equivalent)
- xor.pl
- Simple bitwise xor script written in Perl
Installation
Prerequisites
$ sudo apt-get install p7zip-full
Installation of unbup
$ cd /data/tools/ $ git clone https://github.com/OpenSecurityResearch/unbup.git $ cd unbup/
Usage
Syntax
Usage: ./UnBup.sh [option] <file.bup>
Options
- -d
- details file only (no executable)
- -h
- help menu
- -s
- safe executable (extension is .ex)
Example
Let's extract a BUP file:
$ ./UnBup.sh 7dd9a0333b32c0.bup Extracting encoded files from Bup Creating the Details.txt file Extracting the binary
Following files are created:
- 800000CB.@: the virus
- Details.txt: the details file created by unbup
Here is what my Details.txt file looks like:
$ cat Details.txt [Details] DetectionName=TDSS.d DetectionType=1 EngineMajor=5600 EngineMinor=1067 DATMajor=7192 DATMinor=0 DATType=2 ProductID=12106 CreationYear=2013 CreationMonth=9 CreationDay=10 CreationHour=0 CreationMinute=51 CreationSecond=59 TimeZoneName=Romance Daylight Time TimeZoneOffset=-120 NumberOfFiles=1 NumberOfValues=5 [Value_0] KeyRoot=HKLM KeyName=Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced ValueName=HIDEFILEEXT KeyIs64Bit=0 WasAdded=0 ValueType=4 ValueData=0 [Value_1] KeyRoot=HKLM KeyName=Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced ValueName=SUPERHIDDEN KeyIs64Bit=0 WasAdded=0 ValueType=4 ValueData=1 [Value_2] KeyRoot=HKLM KeyName=Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced ValueName=SHOWSUPERHIDDEN KeyIs64Bit=0 WasAdded=0 ValueType=4 ValueData=1 [Value_3] KeyRoot=HKLM KeyName=Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced ValueName=HIDDEN KeyIs64Bit=0 WasAdded=0 ValueType=4 ValueData=1 [Value_4] KeyRoot=HKLM KeyName=Software\Microsoft\Windows\CurrentVersion\Policies\Explorer ValueName=NOFOLDEROPTIONS KeyIs64Bit=0 WasAdded=0 ValueType=4 ValueData=0 [File_0] ObjectType=5 OriginalName=C:\PROGRAM FILES\GOOGLE\DESKTOP\INSTALL\{6D07572D-6BCD-0CDF-F507-A0F64F465B69}\ \ \ﯹ๛\{6D07572D-6BCD-0CDF-F507-A0F64F465B69}\U\800000CB.@ WasAdded=0 [File_1] ObjectType=5