Skip to content

Commit

Permalink
recipe 49
Browse files Browse the repository at this point in the history
  • Loading branch information
mattnotmax committed Jun 5, 2021
1 parent d2e782a commit b8a5989
Show file tree
Hide file tree
Showing 3 changed files with 10 additions and 0 deletions.
10 changes: 10 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -146,6 +146,8 @@ Some example CyberChef recipes:

[Recipe 48: vjw0rm Emoji Madness](#recipe-48---vjw0rm-emoji-madness)

[Recipe 49: Disassemble an EICAR test file](#recipe-49---disassemble-an-eicar-test-file)

## Recipe 1 - Extract base64, raw inflate and code beautify

A very common scenario: extract Base64, inflate, beautify the code. You may need to then do further processing or dynamic analysis depending on the next stage.
Expand Down Expand Up @@ -798,7 +800,15 @@ Source: https://twitter.com/c_APT_ure/status/1362146658117701632

![Recipe 48](screenshots/recipe_48.png)

## Recipe 49 - Disassemble an EICAR test file

The EICAR test file has a standard known structure of a 16 bit DOS program. Using CyberChef we can take any valid EICAR test file and break it down to its assembly. Here we use subsections (are we getting the idea that subsections are awesome yet?) and use it to capture and manipulate sections that we require. CyberChef can produce disassembly in 16, 32 or 64 bit and voilà! We've got the correct output. With thanks to Nintechnet blog for breaking down the EICAR file and helping me to understand the structure.

Source: https://blog.nintechnet.com/anatomy-of-the-eicar-antivirus-test-file/

`[{"op":"Subsection","args":["(.*)(\\$.*\\$)(.*)",true,false,false]},{"op":"To Hex","args":["None",0]},{"op":"Disassemble x86","args":["16","Full x86 architecture",16,0,true,false]},{"op":"Merge","args":[]},{"op":"Subsection","args":[".*(\\$.*\\$)",true,true,false]},{"op":"Find / Replace","args":[{"option":"Regex","string":"^"},"db\\t\\t\\t\\t",true,false,true,false]},{"op":"Merge","args":[]},{"op":"Subsection","args":[".*\\$(.*)",true,true,false]},{"op":"To Hex","args":["None",0]},{"op":"Disassemble x86","args":["16","Full x86 architecture",16,0,true,false]},{"op":"Find / Replace","args":[{"option":"Regex","string":"^"},"\\n",true,false,false,false]}]`

![Recipe 49](screenshots/recipe_49.png)

# Training

Expand Down
Binary file added screenshots/recipe_49.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added source_files/recipe_49.zip
Binary file not shown.

0 comments on commit b8a5989

Please sign in to comment.