diff --git a/DeepWhite.md b/DeepWhite.md index 93d3679..9eb884d 100644 --- a/DeepWhite.md +++ b/DeepWhite.md @@ -1,19 +1,37 @@ -DeepWhite +## DeepWhite Detective whitelisting using Sysmon event logs -Placeholder, more to come... +## VirusTotal and Whitelisting setup + +Setting up VirusTotal hash submissions and whitelisting: + +The hash checker requires Post-VirusTotal: + + - https://github.com/darkoperator/Posh-VirusTotal + +It also requires a VirusTotal API key: + + - https://www.virustotal.com/en/documentation/public-api/ + +The script assumes a personal API key, and waits 15 seconds between submissions. + +## Generating a Whitelist Install hashdeep: https://github.com/jessek/hashdeep/releases Generate your own whitelist on Windows: +``` hashdeep.exe -r / -c md5,sha1,sha56 > raw-hashes.csv +``` Note that hashdeep, etc., has a dumb recursive design (from the manpage): -Enables recursive mode. All subdirectories are traversed. Please note that recursive mode cannot be used to examine all files of a given file extension. For example, calling hashdeep -r *.txt will examine all files in directories that end in .txt. -Move file to Unix/Linux, remove Windows carriage returns, grab EXEs and DLLs, make CSV. - -CSV format will be: md5,sha1,sha256,full path: - +> Enables recursive mode. All subdirectories are traversed. Please note that recursive mode cannot be used to examine all files of a given file extension. For example, calling hashdeep -r *.txt will examine all files in directories that end in .txt. Move file to Unix/Linux, remove Windows carriage returns, grab EXEs and DLLs, make CSV. +: +``` cat raw-hashes.csv | tr -d '\r' | egrep "\.dll$|\.exe$" | cut -d, -f2- > win10-x64.csv +``` + +Add this entry to the first line of the file (only sha256 and path are currently needed) +```md5,sha1,sha256,path```