# bamfdetect **Repository Path**: mirrors_bwall/bamfdetect ## Basic Information - **Project Name**: bamfdetect - **Description**: No description available - **Primary Language**: Unknown - **License**: MIT - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2023-02-28 - **Last Updated**: 2026-01-25 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README bamfdetect ========== Identifies and extracts information from bots and other malware. Information is returned in a readable json format. bamfdetect works by reading files into RAM, applying any applicable preprocessors, then applying Yara signatures from modules to determine which module it matches. After a match is located, the module can then extract the configuration from the file. Currently, only a preprocess for UPX files is supported. This preprocessor writes the file data to a temporary file, then calls upx -d on the temporary file, and rereads the data from that temporary file. Currently Supported Malware --------------------------- - Abaddon - Alina - Andromeda - Backoff - BlackShades - BlackWorm - Bozok - CyberGate - Cythosia - DarkComet - Dendroid - Dexter - DiamondFox - Easter JackPOS - Elise - Evora - Genome - GlassRAT - Herpesnet - JackPOS - Maazben - MadnessPro - Nanocore - njRat - pBot - PoisonIvy - Pony - ProjectHook - Solar - VertexNet - vSkimmer - XtremeRAT Module Development ------------------ Until I have time to write a guide for writing modules, please use existing modules as a means of writing your own. Usage -----
cloud@strife:~$ bamfdetect -h
usage: bamfdetect [-h] [-v] [-d] [-r] [-l] [-m MODULE] [-t THREADS]
                  [path [path ...]]

Identifies and extracts information from bots

positional arguments:
  path                  Paths to files or directories to scan

optional arguments:
  -h, --help            show this help message and exit
  -v, --version         show program's version number and exit
  -d, --detect          Only detect files
  -r, --recursive       Scan paths recursively
  -l, --list            List available modules
  -m MODULE, --module MODULE
                        Modules to use, if not definedall modules are used
  -t THREADS, --threads THREADS
                        Number of threads to use

bamfdetect v1.6.15 by Brian Wallace (@botnet_hunter)
Requirements ------------ - pefile (python module) - yara (python module) - rarfile - upx (binary) - pycrypto - pbkdf2 Notes ----- PE files will be checked if they are UPX compressed before being scanned. If they are, they will be written to a temporary file, then decompressed with the UPX utility. Yara rules and extraction will then be applied to the resulting data. This project has been moved from https://github.com/bwall/bamf