New AmCache EvilHunter Tool For Detecting Malicious Activities in Windows Systems

Source: Cyber Security News

Author: Guru Baran

URL: https://cybersecuritynews.com/amcache-evilhunter-tool/

New AmCache EvilHunter Tool For Detecting Malicious Activities in Windows Systems

ONE SENTENCE SUMMARY:

AmCache-EvilHunter enhances incident response by parsing AmCache data, automating threat detection, and accelerating DFIR workflows.

MAIN POINTS:

  1. AmCache aids in identifying benign and malicious software on Windows systems.
  2. It is resistant to tampering, preserving data even after malware auto-deletion.
  3. Stores SHA-1 hashes for querying threat intelligence feeds like VirusTotal.
  4. Kaspersky’s tool automates parsing of Amcache.hve registry for indicators of compromise.
  5. Developed in Python, it extracts metadata from specific registry keys.
  6. Offers advanced filtering with features like the –find-suspicious flag.
  7. Performs automated threat lookups, enhancing response efficiency.
  8. Supports keyword searches for deleted or transient tools.
  9. Modular architecture allows for custom integrations and platform support.
  10. Available on GitHub for Windows and Linux, reducing manual DFIR effort.

TAKEAWAYS:

  1. Automatically preserves evidence against self-erasing malware.
  2. Integrates threat intelligence feeds for rapid IOC generation.
  3. Simplifies detection and containment processes in incident response.
  4. Provides advanced filtering to reduce analytical noise.
  5. Modular setup facilitates further customization and platform integration.