ThreatScraper: Automated Threat Intelligence Gathering and Anal... - Aaron Morath & Dr. Scott Graham

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • number6
    404 Image not found
    • Apr 2019
    • 2172

    #1

    ThreatScraper: Automated Threat Intelligence Gathering and Anal... - Aaron Morath & Dr. Scott Graham

    ThreatScraper: Automated Threat Intelligence Gathering and Analysis for VirusTotal

    Saturday August 12, 14:00 – 15:55, Accord Boardroom, Forum

    Aaron Morath & Dr. Scott Graham

    VirusTotal serves as a popular platform for aggregating malware information submitted by Anti-Virus (AV) software providers, which can be searched using parameters such as hashes (SHA-1, SHA-256, MD5), file names, and malicious web links. In order to enhance and automate the process of malware intelligence gathering, we introduce ThreatScraper, a Python-based tool that automates free API queries and rescanning tasks on VirusTotal. ThreatScraper is designed to periodically request reports on specified files and save the results in a local database or Excel file. It allows users to pull and aggregate malicious file reports from multiple AV vendors over time, providing insights into the adoption of malware detection across providers. Easily implemented from any Windows command line, ThreatScraper can rescan a file, pull a report, and then sleep until the next designated time identified by the user.

    Captain Aaron "AJ" Morath, CEH/CompTIA Pentest+, is a graduate student at the Air Force Institute of Technology, where he is involved in researching malware identification and propagation. His thesis work concentrates on developing innovative strategies to combat evolving cybersecurity threats and enhance security measures. AJ has served as the Defensive Cyber Operator (DCO) Officer in Charge (OIC) of the NASIC DCO team for three years. He oversaw the security and defense of an enterprise network comprising over 6,000 connected devices.

    Dr. Scott Graham is a Professor of Computer Engineering at the Air Force Institute of Technology. His research interests center on cyber physical systems, looking at the intersection between real physical systems and the computers that control them. Specific areas of interest include cyber physical systems security, computer architecture, embedded computing, critical infrastructure protection, and vehicular cyber security.

    Audience - Offensive and Defensive Cyber​
    Starts
    August 12, 2023 14:00
    Ends
    August 12, 2023 15:55
    Location
    Accord Boardroom, Forum
  • ThreatScraper
    Member
    • Jul 2023
    • 1

    #2
    Hello, and thank you for taking the time to check out our program!

    ThreatScraper is a Python-based tool designed to check virus information by using VirusTotal API. VirusTotal does not provide the ability to track which A/V programs detected a malicious file over time, and only the most recent results are displayed on the website for free users. ThreatScraper was developed to fill in this gap, and used to gather the information we needed for our research. It offers functionalities such as scheduling the checking at specific times, showing and saving the graph of malware detection trends, as well as saving virus information to an Excel file. This Excel file is used by the program to save report information, as well as the source of information used in ThreatScraper's visualizations.

    Click image for larger version

Name:	All_Windows.jpg
Views:	571
Size:	207.4 KB
ID:	246553


    If you want to check out ThreatScraper for yourself, you can grab it from GitHub:

    amorath/ThreatScraper (github.com)

    For a guide on the usage of ThreatScraper, please refer to the documentation provided on GitHub:

    ThreatScraper Documenation.docx

    Comment

    Working...