Skip to content

Latest commit

 

History

History
 
 

2020-09-25_finfisher

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Technical Report

This repository contains indicators of compromise and scripts related to the report German-made FinSpy spyware found in Egypt, and Mac and Linux versions revealed published by Amnesty Tech in September 2020.

Indicators:

  • domains.txt : domains identified
  • ips.txt : IPv4 addresses identified
  • sha256.csv : sha256 of samples identified
  • rules.yar : Yara rules

Tools in the script folder:

  • decode_modules.py : decode encrypted modules of Linux and MacOs
  • read_config.py : read FinSpy configuration
  • android/extract_config.py : extract configuration from FinSpy Android samples
  • android/java_parser.py : extract obfuscated strings from decompiled java code
  • android/string_decoder.py : decode obfuscated strings
  • linux/extract_config.py : extract configuration files from a Linux FinSpy installer
  • cobaltstrike/cobaltstrike_config.py: extract the configuration of a Cobalt Strike payload
  • cobaltstrike/cobaltstrike_decode.py: decode an obfuscated Cobalt Strike payload

Additional files:

  • android_tlv_list.csv : list of TLV values extracted from the Android sample