Zouri is a fast and stable disassembler that can identify junk code versus data and loop tracking. It uses byte regex to add more name info to the compiled program and has built-in signatures for standard function headers. It can output 5.3 gigabytes of JSON for easy analysis and can be installed using cargo build release.
- Zouri is a fast and stable disassembler that can identify junk code versus data and loop tracking
- It uses byte regex to add more name info to the compiled program
- It has built-in signatures for standard function headers
- It can output 5.3 gigabytes of JSON for easy analysis
- It can be installed using cargo build release
The disassembler runs really fast, especially on an SSD. It can output 5.3 gigabytes of JSON which can be analyzed using JQ or thrown onto the blockchain. It is easy to install using cargo build release.
In a world of high volume malware and limited researchers, we need a dramatic improvement in our ability to process and analyze new and old malware at scale. Unfortunately, what is currently available to the community is incredibly cost prohibitive or does not rise to the challenge. As malware authors and distributors share code and prepackaged tool kits, the white hat community is dominated by solutions aimed at profit as opposed to augmenting capabilities available to the broader community. With that in mind, we are introducing our library for malware disassembly called Xori as an open source project. Xori is focused on helping reverse engineers analyze binaries, optimizing for time and effort spent per sample. Xori is an automation-ready disassembly and static analysis library that consumes shellcode or PE binaries and provides triage analysis data. This Rust library emulates the stack, register states, and reference tables to identify suspicious functionality for manual analysis. Xori extracts structured data from binaries to use in machine learning and data science pipelines. We will go over the pain-points of conventional open source disassemblers that Xori solves, examples of identifying suspicious functionality, and some of the interesting things we've done with the library. We invite everyone in the community to use it, help contribute and make it an increasingly valuable tool in this arms race.