Awesome
grap: define and match graph patterns within binaries
https://github.com/QuoSecGmbH/grap
grap takes patterns and binary files, uses a Casptone-based disassembler to obtain the control flow graphs from the binaries, then matches the patterns against them.
Patterns are user-defined graphs with instruction conditions ("opcode is xor and arg1 is eax") and repetition conditions (3 identical instructions, basic blocks...).
grap is available as a standalone tool with a disassembler and python bindings, and as an IDA plugin which takes advantage of the disassembly done by IDA and the reverser.
Support:
- Files: disassembly of PE, ELF and raw binary, further files should work within IDA
- Architecture: x86 and x86_64
Match quick pattern:
Match full pattern:
Match on multiple files:
Create patterns interactively from IDA:
Installation
This document describes how to build and install grap on a Linux distribution.
You may also read:
- WINDOWS.md: installing grap on Windows
- IDA.md: installation and usage instruction of the IDA plugin
Requirements
Besides compilers (build-essential), the following dependencies must be installed:
- cmake
- bison
- flex
- libboost-regex-dev
- libboost-system-dev
- libboost-filesystem-dev
- libseccomp-dev
- python3-dev
- python3-pefile
- python3-pyelftools
- python3-capstone
- swig (version 3 or newer is mandatory)
Thus on Ubuntu / Debian, this should work :
sudo apt-get install build-essential cmake bison flex libboost-regex-dev libboost-system-dev libboost-filesystem-dev libseccomp-dev python3-dev python3-pefile python3-pyelftools python3-capstone swig
Please note that those were tested for the latest Ubuntu LTS (18.04.3). Packages may differ depending on your distribution.
Build and install
The following commands will build and install the project:
mkdir build; cd build/
as we advise you to build the project in a dedicated directorycmake ../src/; make
will build with cmake and makesudo make install
will install grap into /usr/local/bin/
SWIG might fail to find python3 if your default version is python2, this can be overcome by switching to python3 as default. For instance on Ubuntu:
sudo update-alternatives --install /usr/bin/python python /usr/bin/python3 10
Usage
The tool can be launched by using the following command:
$ grap [options] pattern test_paths
Below are a few examples of supported options:
grap -h
: describes supported options
One can let grap infer a pattern from a string. Only few options are supported but this is useful for prototyping:
grap "opcode is xor and arg1 contains '['" (test.exe)
: look for a xor with a memory writegrap -v "sub->xor->sub" (test.exe)
: -v will output the path of the inferred pattern
Choose how the binaries are disassembled:
grap -od (pattern.grapp) samples/*
: disassemble files in folder samples/ with no attempt at matchinggrap -f (pattern.grapp) (test.exe)
: force re-disassembling the binary, then matches it against pattern.grappgrap --raw (pattern.grapp) (test.bin)
: disassembling raw file (use --raw-64 for 64 bits binaries)
Control the verbosity of the output:
grap -q -sa (pattern.grapp) (samples/*.grapcfg)
: match disassembled files, show matching and non matching files, one per linegrap -m (pattern.grapp) (test.grapcfg)
: show all matched nodes
Choose where the disassembled file(s) (.grapcfg) are written; match multiple files against multiple patterns:
grap patterns/basic_block_loop.grapp -o ls.grapcfg /bin/ls
: disassemble ls into ls.grapp and looks for basic block loopsgrap (pattern1.grapp) -p (pattern2.grapp) (test.exe)
: match against multiple pattern filesgrap -r -q patterns/ /bin/ -o /tmp/
: disassemble all files from /bin/ into /tmp/ and matches them against all .grapp patterns from patterns/ (recursive option -r applies to /bin/, not to patterns/)
Pattern examples
The following pattern detects a decryption loop consisting of a xor followed by sub found in a Backspace sample:
digraph decryption_md5_4ee00c46da143ba70f7e6270960823be {
A [cond=true, repeat=3]
B [cond="opcode is xor and arg2 is 0x11"]
C [cond="opcode is sub and arg2 is 0x25"]
D [cond=true, repeat=3]
E [cond="opcode beginswith j and nchildren == 2"]
A -> B
B -> C
C -> D
D -> E
E -> A [childnumber=2]
}
Note that pattern files can contain multiple pattern graphs.
You may find additional pattern examples in two directories:
- patterns/ contains a few patterns that can be useful on any binary such as a pattern to detect short loops or to detect a loop on basic blocks,
- examples/ contains patterns used against the Backspace malware (see examples/backspace_samples.md to obtain the binary samples).
Tutorials & further examples
On malware samples:
- Navigating malware samples with grap (CLI, IDA): https://yaps8.github.io/blog/grap_qakbot_navigation
- Automating function parsing and decryption (python bindings): https://yaps8.github.io/blog/grap_qakbot_strings
Python bindings usage:
- Python file demonstrating how to use bindings to analyze Backspace samples: examples/analyze_backspace.py
- Examples of IDApython scripting are integrated within the IDA plugin, you can see them here: https://yaps8.github.io/grap/html/scripting_css.html
Documentation
You will find more documentation in the doc/ folder:
The syntax of pattern and test graphs is detailed in the file grap_graphs.pdf within the release section.
License
grap is licensed under the MIT license. The full license text can be found in LICENSE.