You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
How to use malware parsers (mwcp, RATdecoders, malduck, MACO, cape-parsers), and what are the things that need to be configured to run the functions of these malware parsers?
#2447
Open
6 tasks done
superonion7890 opened this issue
Jan 5, 2025
· 4 comments
Please answer the following questions for yourself before submitting an issue.
I am running the latest version
I did read the README!
I checked the documentation and found no answer
I checked to make sure that this issue has not already been filed
I'm reporting the issue to the correct repository (for multi-repository projects)
I have read and checked all configs (with all optional parts)
Expected Behavior
I don't know with the detailed how to use the malware parser function on this latest CAPEv2 version. I hope to gain more insights regarding the use of these malware parser functions.
Current Behavior
Some of function that I have enabled run normally, and no problem at all, I'm just confused about how to use the malware parser.
The text was updated successfully, but these errors were encountered:
Can you be more specific? Have you installed cape-parsers from their own repository as explained in the changelog recently?
We need specific details and machine output for your issue to be able to help.
I've done the installation of CAPE-parsers, MACO, malduck, RAT-king-parser, MWCP, RATDecoders (a.k.a malwareconfig)
But the thing I'm confused is where the parser file is used, and how it works, and how to update the parser file when there is an update?
During this way I use and know is to run the command poetry run python3 utils/community.py -waf , in addition I also add a CAPE-parser directory sourced from https://github.com/CAPESandbox/CAPE-parsers/tree/main/cape_parsers into the directory /opt/CAPEv2/modules/processing/processing/parsers
Is the way I do right? I asked you for your feedback, thank you very much!
and restart processing by systemctl restart cape-processor
so if you just a user and not writting configs, just follow those 2 steps, if you write a parsers, then if you will contribbute, subbmit pull request of parser and unittest + sample to test files. If you gonna use pure python private parsers, just places them under custom/parsers.
Prerequisites
Please answer the following questions for yourself before submitting an issue.
Expected Behavior
I don't know with the detailed how to use the malware parser function on this latest CAPEv2 version. I hope to gain more insights regarding the use of these malware parser functions.
Current Behavior
Some of function that I have enabled run normally, and no problem at all, I'm just confused about how to use the malware parser.
The text was updated successfully, but these errors were encountered: